A survey of intrusion detection techniques
Computers and Security
Role-Based Access Control Models
Computer
Lattice-Based Access Control Models
Computer
Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots: returning to our diverse roots
Role-based access control in online authoring and publishing systems vs. document hierarchy
SIGDOC '99 Proceedings of the 17th annual international conference on Computer documentation
Authorization and Access Control of Application Data in Workflow Systems
Journal of Intelligent Information Systems - Special issue: A survey of research questions for intelligent information systems in education
Tailoring Groupware: The Cooperative HypermediaApproach
Computer Supported Cooperative Work
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
CoSMo: An Approach Towards Conceptual Security Modeling
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
A Role-Based Security Architecture for Business Intelligence
TOOLS '00 Proceedings of the Technology of Object-Oriented Languages and Systems (TOOLS 34'00)
Communications of the ACM - Mobile computing opportunities and challenges
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms
Electronic Commerce Research
End-user controlled group formation and access rights management in a shared workspace system
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Maintaining privacy on derived objects
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Proceedings of the 43rd annual Southeast regional conference - Volume 2
A review of information security issues and respective research contributions
ACM SIGMIS Database
Audit-Based Access Control for Electronic Health Records
Electronic Notes in Theoretical Computer Science (ENTCS)
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Improved client authentication using session authentication in the internet
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
A formal framework for adaptive access control models
Journal on data semantics IX
A universal access control method based on host identifiers for Future Internet
Computers & Mathematics with Applications
Security agent model using interactive authentication database
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
A survey of security issue in multi-agent systems
Artificial Intelligence Review
Are markets for vulnerabilities effective?
MIS Quarterly
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.00 |