Author of the publication

Role Delegation for a Resource-Based Security Model.

, , , , and . DBSec, volume 256 of IFIP Conference Proceedings, page 37-48. Kluwer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Variation in Teaching Effort Across Tasks in Online and Traditional Courses., and . ICEIS (4), page 202-207. (2004)Changes to an IT program in response to the IT 2008 curriculum guidelines., , , , and . SIGITE Conference, page 192-198. ACM, (2009)Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation., , , , and . ACM Conference on Computer Science, page 319-325. ACM, (1990)Student Participation in OSS Projects., , , and . OSS, volume 319 of IFIP Advances in Information and Communication Technology, page 429-430. Springer, (2010)Preparing to Teach Humanitarian Open Source (Abstract Only)., , , , and . SIGCSE, page 704. ACM, (2016)Self-grading: an approach to supporting self-directed learning.. ITiCSE, page 349. ACM, (2006)Project selection for student involvement in humanitarian FOSS., , and . CSEE&T, page 359-361. IEEE, (2013)The Power of Open Source for Social Good to Increase Diversity in Computing., , and . SIGCSE, page 1305. ACM, (2021)Can humanitarian open-source software development draw new students to CS?, , , , and . SIGCSE, page 551-555. ACM, (2007)Panel: Better Team Projects., , , and . SIGITE, page 169-170. ACM, (2023)