![]() ![]() ![]() ![]() ![]() ![]() ![]() | |||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
A credibility-based model of computer system security
Pages 53-58
|
Categories and Subject Descriptors:
Computing Methodologies -Simulation and Modeling - Applications (I.6.3);
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5);
General Terms:
Design,
Management,
Security
![]() |
![]() |
![]() The Digital Library is published by the Association for Computing Machinery. Copyright © 1999, 2000 ACM, Inc.
This page was last updated Thu, 17 Aug. 2000 03:05 -0500
.
|
![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |