Publication | Closed Access
Cross-domain access control based on trusted third-party and attribute mapping center
16
Citations
24
References
2020
Year
Trusted SystemAuthentication AuthorizationEngineeringLogical Access ControlTrusted Third-partyInformation SecurityCross-domain Access ControlAccess ControlAuthentication Access ControlData SecurityAttribute Mapping Center
| Year | Citations | |
|---|---|---|
Page 1
Page 1