Access Control Models: From the real-world to trusted computing
https://www.powershow.com/view1/ce60e-ZDc1Z/Access_Control_Models_From_the_real-world_to_trusted_computing_powerpoint_ppt_presentation
Icons create by Freepik from www.flaticon.com/
Icons create by Freepik from www.flaticon.com/