The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
ACTA: a framework for specifying and reasoning about transaction structure and behavior
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
Database transaction models for advanced applications
Protection in operating systems
Communications of the ACM
Using Flexible Transactions to Support Multi-System Telecommunication Applications
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
ACM SIGOPS Operating Systems Review
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role-based access control and distributed object-based enterprise computing
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Partial outsourcing: a new paradigm for access control
Proceedings of the eighth ACM symposium on Access control models and technologies
Dynamic and risk-aware network access management
Proceedings of the eighth ACM symposium on Access control models and technologies
Towards a secure web-based healthcare application
Knowledge media in healthcare
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Separation of duties for access control enforcement in workflow environments
IBM Systems Journal - End-to-end security
Enforcing security properties in task-based systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Dynamic, context-aware, least-privilege grid delegation
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
A composite-service authorization prediction platform for grid environment
CDVE'07 Proceedings of the 4th international conference on Cooperative design, visualization, and engineering
Trust-Based secure workflow path construction
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
Information and Software Technology
Automatic security assessment for next generation wireless mobile networks
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |