Abstract
Key-value stores typically leave access control to the systems for which they act as storage engines. Unfortunately, attackers may circumvent such rea......
小提示:本篇文献需要登录阅读全文,点击跳转登录