@dblp

Enforcing authorizations while protecting access confidentiality.

, , , , and . Journal of Computer Security, 26 (2): 143-175 (2018)

Links and resources

Tags