|
Volumn , Issue , 2006, Pages
|
Reinforcing access control using fuzzy relation equations
|
Author keywords
Access control; Fuzzy relations; Security
|
Indexed keywords
ACCESS PERMISSIONS;
ACCESS-CONTROL;
AUTHENTICATION SYSTEMS;
AUTHORIZED USERS;
COMPUTER SECURITY SYSTEMS;
DISTRIBUTED SYSTEMS;
FUZZY INFORMATIONS;
FUZZY RELATION EQUATIONS;
FUZZY SET THEORIES;
FUZZY-RELATIONS;
HEURISTIC INFORMATIONS;
SECURITY;
SECURITY BREACHES;
SECURITY CHECKS;
SECURITY MODELS;
SYSTEM COMPONENTS;
UNAUTHORIZED USERS;
AUTHENTICATION;
FUZZY SETS;
SECURITY OF DATA;
SECURITY SYSTEMS;
FUZZY CONTROL;
|
EID: 84869243999
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (10)
|
References (5)
|