Now showing items 1-1 of 1

    • Owned Policies for Information Security 

      Chong, Stephen; Chen, Howard
      In many systems, items of information have own- ers associated with them. An owner of an item of in- formation may want the system to enforce a policy that restricts use of that information; we call such a policy an owned ...