Author of the publication

The role-based access control system of a European bank: a case study and discussion.

, , and . SACMAT, page 3-9. ACM, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Uniform Presentation of Confidentiality Properties.. IEEE Trans. Software Eng., 17 (11): 1186-1194 (1991)The role-based access control system of a European bank: a case study and discussion., , and . SACMAT, page 3-9. ACM, (2001)Two-Stage Optimisation in the Design of Boolean Functions., and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 242-254. Springer, (2000)On the Security of Recent Protocols., and . Inf. Process. Lett., 56 (3): 151-155 (1995)Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors., and . CLOSER, page 604-609. SciTePress, (2014)Human competitive security protocols synthesis., , and . GECCO, page 1855-1856. ACM, (2006)Specifying Information-Flow Controls., and . ICDCS Workshops, page 114-120. IEEE Computer Society, (2005)Specifying Security for Computer Supported Collaborative Working., and . J. Comput. Secur., 3 (4): 233-254 (1995)Security specifications.. S&P, page 14-23. IEEE Computer Society, (1988)On the Derivation of Secure Components.. S&P, page 242-247. IEEE Computer Society, (1989)