Login / Signup

Beyond proof-of-compliance: security analysis in trust management.

Ninghui LiJohn C. MitchellWilliam H. Winsborough
Published in: J. ACM (2005)
Keyphrases