Login / Signup
Removal of all unauthorized access paths in production software.
Charles Cresson Wood
Published in:
Inf. Manag. Comput. Secur. (1996)
Keyphrases
</>
access paths
databases
database systems
access path
b tree