1990 Proceedings of the Sixth Annual Computer Security Applications Conference

Abstract