Login / Signup
Leveraging Hardware Isolation for Process Level Access Control & Authentication.
Syed Kamran Haider
Hamza Omar
Ilia A. Lebedev
Srinivas Devadas
Marten van Dijk
Published in:
SACMAT (2017)
Keyphrases
</>
access control
security mechanisms
identity management
fine grained
dynamic access control
security requirements
security policies
data security
security architecture
protection schemes
role based access control model
rights management