Amanote Research

Amanote Research

    RegisterSign In

Trojan Horse Resistant Discretionary Access Control

doi 10.1145/1542207.1542244
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2009

Authors
Ziqing MaoNinghui LiHong ChenXuxian Jiang
Publisher

ACM Press


Related search

Wolbachia: The Selfish Trojan Horse in Dengue Control

Medical Journal Armed Forces India
Medicine
2016English

A Type System for Discretionary Access Control

Mathematical Structures in Computer Science
MathematicsComputer Science Applications
2009English

How to Do Discretionary Access Control Using Roles

1998English

Imidazoacridinone-Dependent Lysosomal Photodestruction: A Pharmacological Trojan Horse Approach to Eradicate Multidrug-Resistant Cancers

Cell Death and Disease
Molecular NeuroscienceImmunologyCell BiologyCancer ResearchCellularMedicine
2012English

Theory of the Trojan–Horse Method

Annals of Physics
AstronomyPhysics
2003English

GUT-the Trojan Horse in Remote Organs’ Autoimmunity

Journal of Clinical & Cellular Immunology
2016English

Implementing Risk Calculators: Time for the Trojan Horse?

British Journal of Anaesthesia
AnesthesiologyPain Medicine
2018English

Analysis of Trojan-Horse Attack Against Untrusted Source

Computer Science and Application
2018English

Platelet Lipidome: Dismantling the ‘Trojan Horse’ in the Bloodstream

Journal of Thrombosis and Haemostasis
MedicineHematology
2020English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy