RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
A scenario-driven role engineering process for functional RBAC roles
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Engineering of role/permission assignments
Engineering of role/permission assignments
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
Role Engineering for Enterprise Security Management
Role Engineering for Enterprise Security Management
A closer look to the V-model approach for role engineering
WSEAS Transactions on Computers
Hi-index | 0.00 |
As the sophistication of intruders' increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an ...