Non-interference analysis of delegation subterfuge in distributed authorization systems

Abstract

Abstract is not available.

    Similar works