See access control and wildcard mask. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.
Researchers at the University of Electro-Communications have developed a framework for improving system security by analyzing business process logs. The research is published in the International ...