scientific article; zbMATH DE number 2173750
From MaRDI portal
Publication:4680552
Recommendations
Cited in
(22)- scientific article; zbMATH DE number 2172823 (Why is no real title available?)
- Read-abortion (RA) based synchronization protocols to prevent illegal information flow
- scientific article; zbMATH DE number 2100552 (Why is no real title available?)
- scientific article; zbMATH DE number 2044542 (Why is no real title available?)
- Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns
- Securing the Web of Things with role-based access control
- scientific article; zbMATH DE number 1808268 (Why is no real title available?)
- Access Control in Data Management Systems
- Non-linear and non-group cellular automata chaining technique for cryptographic applications
- A typed language for events
- Access nets: modeling access to physical spaces
- Design and Implementation of Fast Access Control That Supports the Separation of Duty
- Fuzzy role-based access control
- Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy
- Data flow analysis from capability lists, with application to RBAC
- A theory of permission based on the notion of derogation
- Policy analysis for self-administrated role-based access control
- Delegation in role-based access control
- Access Control Systems
- scientific article; zbMATH DE number 1941232 (Why is no real title available?)
- Semantic role based access control model
- Role hierarchies and constraints for lattice-based access controls
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680552)