Login / Signup

Removal of all unauthorized access paths in production software.

Charles Cresson Wood
Published in: Inf. Manag. Comput. Secur. (1996)
Keyphrases
  • access paths
  • databases
  • database systems
  • access path
  • b tree