Protection in operating systems
Communications of the ACM
On the implementation of security measures in information systems
Communications of the ACM
Deploying access control in distributed workflow
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
An integrated model for access control and information flow requirements
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Hi-index | 0.01 |