Improving real-world access control systems by identifying the true origins of a request
Tech report number
CERIAS TR 2009-36
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.