Role-Based Access Control Models
Computer
A lattice model of secure information flow
Communications of the ACM
Proceedings of the 13th international conference on Security protocols
Insider threats to voting systems
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Hi-index | 0.00 |