First Page | Document Content | |
---|---|---|
![]() Date: 2007-09-20 09:41:43Capability-based security Object-capability model EROS Access Control Matrix Ambient authority C-list Infrastructure optimization Confused deputy problem KeyKOS Security Computer security Access control | Source URL: srl.cs.jhu.eduDownload Document from Source WebsiteFile Size: 905,78 KBShare Document on Facebook |