Login / Signup

Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.

Adrian SpalkaArmin B. CremersHartmut Lehmler
Published in: ACISP (2000)
Keyphrases
  • access control
  • control system
  • fuzzy logic
  • data security
  • closed loop
  • control strategy
  • control law
  • neural network
  • control scheme
  • random access
  • genetic algorithm
  • security properties