Treffer: Specifying and using intrusion masking models to process distributed operations.
Title:
Specifying and using intrusion masking models to process distributed operations.
Authors:
Source:
Journal of Computer Security. 2005, Vol. 13 Issue 4, p623-658. 36p. 8 Diagrams, 2 Charts, 3 Graphs.
Database:
Business Source Ultimate