Back to Results
First PageMeta Content
Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security


Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i
Add to Reading List

Document Date: 2000-11-10 16:38:10


Open Document

File Size: 128,92 KB

Share Result on Facebook