From post

Access Rights Administration in Role-Based Security Systems

, и . Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, стр. 37--56. Amsterdam, The Netherlands, The Netherlands, North-Holland Publishing Co., (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Access Rights Administration in Role-Based Security Systems, и . Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, стр. 37--56. Amsterdam, The Netherlands, The Netherlands, North-Holland Publishing Co., (1994)The Role Graph Model and Conflict of Interest., и . ACM Trans. Inf. Syst. Secur., 2 (1): 3-33 (1999)The role graph model., и . ACM Workshop on Role-Based Access Control, ACM, (1995)Modeling Mandatory Access Control in Role-Based Security Systems., и . DBSec, том 51 из IFIP Conference Proceedings, стр. 129-144. Chapman & Hall, (1995)Database Security Issues in Distributed Object-Oriented Databases., и . IWDOM, стр. 92-97. Morgan Kaufmann, (1992)