Techniques for security configuration management in distributed information systems

MM Casalino - 2014 - theses.hal.science
The security of nowadays IT services significantly depends on the correct configuration of
increasingly distributed information systems. At the same time, the management of security …

[引用][C] 分布式应用访问控制策略精化与冲突分析技术

吴迎红, 黄皓, 曾庆凯 - 计算机科学, 2014