Computer Science ›› 2007, Vol. 34 ›› Issue (9): 117-121.
Previous Articles Next Articles
Online:
Published:
Abstract: Access control policies and models available lack of temporal characteristic, and do not well solve the question of identity disguise and cheat in open network, as well as platform trustworthy question effecting on security policies integrity enforcement.
Key words: Computer supported cooperative work, Access control, Trusted computing, Trusted platform module, Policy dissemination
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I9/117
Cited