Formal specification of an access control system
Software—Practice & Experience
Communications of the ACM
Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Does licensing require new access control techniques?
Communications of the ACM
Use of an Experimental Policy Workbench: Description and Preliminary Results
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
Towards a decision model based on trust and security risk management
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Revealing beliefs influencing trust between members of the czech informatics community
SocInfo'11 Proceedings of the Third international conference on Social informatics
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |