<--- Back to Details
First PageDocument Content
Computer access control / Exonumia / Token coin / IP address / Anonymous remailer / One-time password / Computer security / Access control / Computing
Date: 2016-02-02 10:23:17
Computer access control
Exonumia
Token coin
IP address
Anonymous remailer
One-time password
Computer security
Access control
Computing

Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 225,15 KB

Share Document on Facebook

Similar Documents

NetAXS Web-based Access Control System Data Sheet

NetAXS Web-based Access Control System Data Sheet

DocID: 1xVj6 - View Document

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer  SIT, Email: philipp.holzinger@sit

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

DocID: 1xUqk - View Document

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas  Robert Bruce Findler

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

DocID: 1xU35 - View Document

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

DocID: 1xTC8 - View Document