Internal Access Controls

Communications of the ACM, 58 (2015), pp. 62-65
Google Scholar

Abstract

Trust, but verify.