arrow Communications of the ACM
arrow Volume 42 , Issue 7 (1999)

access SIGs conferences publication page subscription page

Trusted recovery
Pages 71-75

Sushil Jajodia, Catherine D. McCollum and Paul Ammann

metadata:   index terms  
rule rule rule rule
full text:   pdf 173 KB

back to top
blue HR


Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking);

General Terms:
Management, Security

blue HR