Login / Signup

A comparison of trusted X security policies, architectures, and interoperability.

Jeffrey PicciottoJeremy Epstein
Published in: ACSAC (1992)
Keyphrases