Login / Signup
Privileges and their use by trusted applications.
Jeffrey Picciotto
J. Wynn
Published in:
FJCC (1987)
Keyphrases
</>
access control
distributed environment
trusted computing
databases
network connection
real time
image processing
multimedia
case study
reinforcement learning
expert systems
medical images
access control policies
trust relationships