Back to Results
First PageMeta Content
Security / Access control / Identity management / Computer security / Computer access control / Authorization / User / XACML


Producing Hook Placements to Enforce Expected Access Control Policies No Author Given No Institute Given Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control
Add to Reading List

Document Date: 2014-11-18 10:12:45


Open Document

File Size: 339,88 KB

Share Result on Facebook