Author of the publication

The NIST model for role-based access control: towards a unified standard.

, , and . ACM Workshop on Role-Based Access Control, page 47-63. ACM, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions., , , , and . ICST Workshops, page 110-117. IEEE, (2022)A Combinatorial Approach to Explaining Image Classifiers., , , and . ICST Workshops, page 35-43. IEEE, (2021)Combinatorially XSSing Web Application Firewalls., , , , , and . ICST Workshops, page 85-94. IEEE, (2021)Future directions in role-based access control., and . ACM Workshop on Role-Based Access Control, ACM, (1995)The NIST model for role-based access control: towards a unified standard., , and . ACM Workshop on Role-Based Access Control, page 47-63. ACM, (2000)Security or Privacy: Can You Have Both?, , and . Computer, 53 (9): 20-30 (2020)Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing., , , and . Math. Comput. Sci., 15 (4): 741 (2021)Measuring Combinatorial Coverage at Adobe., , , , , and . ICST Workshops, page 194-197. IEEE, (2019)Detecting Vulnerabilities in Android Applications using Event Sequences., , and . QRS, page 159-166. IEEE, (2019)Combinatorial and MC/DC Coverage Levels of Random Testing., , , and . QRS Companion, page 61-68. IEEE, (2017)