Jump to Content

Internal Access Controls

Communications of the ACM, vol. 58 (2015), pp. 62-65

Abstract

Trust, but verify.