Which of the following models deals with how subjects can access objects based upon established rights and capabilities?
Which of the following deals with increasing security with flash memory for wireless devices, such as PDAs?