Conference paper
Identity delegation in policy based systems
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
For many years, defence intelligence and government organizations have been using highly specialized security technologies to control access to sensitive information and to protect the integrity of information. In the face of increasing insider trading and industrial espionage, this paper describes how business can exploit technology that has previously been available only to spooks and is now available in open systems products.
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
Hendrik F. Hamann
InterPACK 2013
William Hinsberg, Joy Cheng, et al.
SPIE Advanced Lithography 2010