First Page | Document Content | |
---|---|---|
![]() Date: 2005-04-29 09:42:28Computer security Security Access control Computer access control XACML Binary decision diagram PERMIS Information flow Role-based access control Policy analysis Security-Enhanced Linux Model checking | Add to Reading List |