First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2008-02-07 14:26:30Open Document File Size: 371,51 KBShare Result on FacebookCityFairfax / /CompanyACM Inc. / AEGIS / Digital Rights Management / Microsoft / /CountryUnited States / /CurrencyUSD / / /EventMan-Made Disaster / /FacilityU CONABC Usage Control Model JAEHONG PARK George Mason University / George Mason University / /IndustryTermbusiness systems / use-control technologies / mass distribution systems / pervasive computing phenomenon / distributed computing environments / e-book / access control systems / earlier timesharing systems / business to business / healthcare domain / services / client-side trusted computing base / public-key infrastructure / e - business / e-book systems / copyright/server / server-side encapsulation software / secure computing environment / trusted computing base / server systems / trusted client-side computing / Healthcare information system / trust management / Internet networks / client-side software / Web services / /OrganizationLaboratory for Information Security Technology / Palladium and Intel-driven Trusted Computing Platform Alliance / National Science Foundation / MIT / George Mason University / ISE Department / /PersonRAVI SANDHU NSD / Jaehong Park / U CONABC / /PositionAuthor / model / core model / General / physician / etc / /ProgrammingLanguageABC / /ProvinceOrStateVirginia / /Technologyuse-control technologies / cellular telephone / CRM / MPEG / API / microwave / underlying technologies / MP3 / Operating Systems / PDA / public-key infrastructure / access control list / mobile devices / /URLhttp /SocialTag |