Login / Signup

A protection model incorporating both authorization and constraints.

Atika LaribiDennis G. Kafura
Published in: Comput. Secur. (1992)
Keyphrases