Inproceedings,

On the Application of Fuzzy Set Theory for Access Control Enforcement.

, , and .
SECRYPT, page 540-547. SciTePress, (2017)

Meta data

Tags

Users

  • @dblp

Comments and Reviews