Home > Talks/Presentations > On the Benefits of Decomposing Policy Engines into Components > Keywords |
<record>
<controlfield tag="001">67</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">authorization</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">access control</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Web services</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">policy</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">policy engines</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">RAD</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">object security attributes </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Engineering Security Mechanisms</subfield>
</datafield>
</record>