Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Creating and enforcing access control policies using description logic techniques
Brian Shields, Owen Molloy
International Journal of Internet Technology and Secured Transactions (IJITST), 2011 Vol.3 No.3, pp.253 - 278
11 + 18 =

Thank you for your feedback.