Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms.
Santosh Kumar HengeGnaniyan Uma MaheswariRajakumar RamalingamSultan S. AlshamraniMamoon RashidJayalakshmi MuruganPublished in: Syst. (2023)