Login / Signup
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.
Adrian Spalka
Armin B. Cremers
Hartmut Lehmler
Published in:
ACISP (2000)
Keyphrases
</>
access control
control system
fuzzy logic
data security
closed loop
control strategy
control law
neural network
control scheme
random access
genetic algorithm
security properties