1
2
by Yeluri, Raghuram.
Published 2014
Format:
Table of Contents: ... Launch Usage Model -- The Data Protection Usage Model -- The Run-time Integrity and Attestation Usage...
Click to View
3
by Nayak, Umesha.
Published 2014
Format:
Table of Contents: ... -- Introduction -- Confidentiality and Data Integrity -- Who Can Access the Data? -- What is an Access Control...
Click to View
4
by Van Assche, Frans.
Published 2015
Format:
Table of Contents: ... -- Designed Solution -- UMAC Server -- UMAC Filter -- UMAC Library -- Sharing Data -- iTEC-PDH request -- i...
Click to View