Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discussion Notes and Research Question List., , and . DBSec, page 263-280. North-Holland, (1988)Role-Based Application Design and Enforcement.. DBSec, page 151-168. North-Holland, (1990)Prototyping to explore MLS/DBMS design., , and . Comput. Secur., 8 (3): 229-245 (1989)Napoleon: Network Application Policy Environment., , and . ACM Workshop on Role-Based Access Control, page 145-152. ACM, (1999)Prototyping as a Research Tool for MLS/DBMS., , and . DBSec, page 63-84. North-Holland, (1988)The LDV Secure Relational DBMS Model., , and . DBSec, page 265-280. North-Holland, (1990)Napoleon: A Recipe for Workflow., , , and . ACSAC, page 134-142. IEEE Computer Society, (1999)Role-Based Access Control Framework for Network Enterprises., , and . ACSAC, page 50-58. IEEE Computer Society, (1998)