logodl
arrow Communications of the ACM
 
arrow Volume 42 , Issue 7 (1999)

access SIGs conferences publication page subscription page

Trusted recovery
Pages 71-75

Sushil Jajodia, Catherine D. McCollum and Paul Ammann

metadata:   index terms  
rule rule rule rule
full text:   pdf 173 KB



back to top
blue HR

INDEX TERMS

Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking);

General Terms:
Management, Security




blue HR