XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Authorization and Access Control of Application Data in Workflow Systems
Journal of Intelligent Information Systems - Special issue: A survey of research questions for intelligent information systems in education
Establishing Business Rules for Inter-Enterprise Electronic Commerce
DISC '00 Proceedings of the 14th International Conference on Distributed Computing
A Logical Framework for Reasoning on Data Access Control Policies
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Modeling and detecting the cascade vulnerability problem using soft constraints
Proceedings of the 2004 ACM symposium on Applied computing
Using certified policies to regulate E-commerce transactions
ACM Transactions on Internet Technology (TOIT)
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
Theoretical Computer Science
Hi-index | 0.00 |