Authentifizierungsverstärkung auf Ressourcenniveau
暂无分享,去创建一个
[1] Rae K. Burns. Referential secrecy , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Simon R. Wiseman,et al. Providing security in a phone book database using triggers , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.