Login / Signup

Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms.

Santosh Kumar HengeGnaniyan Uma MaheswariRajakumar RamalingamSultan S. AlshamraniMamoon RashidJayalakshmi Murugan
Published in: Syst. (2023)
Keyphrases
  • third party
  • trusted third party
  • data providers
  • factor authentication
  • sensitive information
  • reverse logistics
  • digital libraries
  • fault tolerant
  • access control
  • personal information