Adapting usage control as a deterrent to address the inadequacies of access controls

Files in this item

This item appears in the following Collection(s)