Login / Signup
An operating system security method for integrity and privacy protection in consumer electronics.
Jinhong K. Guo
Stephen Johnson
Il-Pyung Park
Published in:
CCNC (2006)
Keyphrases
</>
operating system
privacy protection
databases
case study
information loss
data mining
data structure
access control
security requirements
data security