Computer Science ›› 2007, Vol. 34 ›› Issue (9): 117-121.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Access control policies and models available lack of temporal characteristic, and do not well solve the question of identity disguise and cheat in open network, as well as platform trustworthy question effecting on security policies integrity enforcement.

Key words: Computer supported cooperative work, Access control, Trusted computing, Trusted platform module, Policy dissemination

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!