Article,

Building access control models with attribute exploration.

, , and .
Comput. Secur., 28 (1-2): 2-7 (2009)

Meta data

Tags

Users

  • @jaeschke
  • @dblp

Comments and Reviews