Login / Signup
The Safe-Tcl Security Model.
Jacob Y. Levy
Laurent Demailly
John K. Ousterhout
Brent B. Welch
Published in:
USENIX Annual Technical Conference (1998)
Keyphrases
</>
security model
public key
access control
security analysis
security architecture
security requirements
provably secure
designated verifier
encryption scheme
authentication and key agreement
conflict resolution
databases
open source
cost effective
security mechanisms
digital signature