• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms.

Santosh Kumar HengeGnaniyan Uma MaheswariRajakumar RamalingamSultan S. AlshamraniMamoon RashidJayalakshmi Murugan
Published in: Syst. (2023)
Keyphrases
  • third party
  • trusted third party
  • data providers
  • factor authentication
  • sensitive information
  • reverse logistics
  • digital libraries
  • fault tolerant
  • access control
  • personal information