Login / Signup
The Safe-Tcl Security Model.
John K. Ousterhout
Jacob Y. Levy
Brent B. Welch
Published in:
Mobile Agents and Security (1998)
Keyphrases
</>
security model
public key
access control
security requirements
security analysis
security architecture
provably secure
designated verifier
public key cryptography
artificial intelligence
smart card
real time
secret key
encryption scheme