Search alternatives:
"protectionism" » "protections"

21
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection...

22
Published 2011
Springer US

23
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization -- A Generic Construction...

25
by Atluri, Vijay, Jajodia, Sushil, George, Binto
Published 2000
Springer US
..., essential for protecting sensitive information from unauthorized access, modification and abuse...