Role mining - revealing business roles for security administration using data mining technology
Proceedings of the eighth ACM symposium on Access control models and technologies
V-model approach for role engineering
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
A closer look to the V-model approach for role engineering
WSEAS Transactions on Computers
Visual specifications of policies and their verification
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Hi-index | 0.00 |