Going beyond MAC and DAC using mobile policies
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Modeling of the role-based access control policy with constraints using description logic
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Hi-index | 0.00 |