From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementing transaction control expressions by checking for absence of access rights., и . ACSAC, стр. 131-140. IEEE, (1992)Update semantics for multilevel relations., , и . ACSAC, стр. 103-112. IEEE, (1990)Issues in RBAC.. ACM Workshop on Role-Based Access Control, ACM, (1995)The RSL99 Language for Role-Based Separation of Duty Constraints., и . ACM Workshop on Role-Based Access Control, стр. 43-54. ACM, (1999)Secure Role-Based Workflow Models., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., и . DBSec, том 113 из IFIP Conference Proceedings, стр. 166-181. Chapman & Hall, (1997)Separation of Duties in Computerized Information Systems.. DBSec, стр. 179-190. North-Holland, (1990)Polyinstantiation Integrity in Multilevel Relations Revisited., и . DBSec, стр. 297-308. North-Holland, (1990)The UCONABC usage control model., и . ACM Trans. Inf. Syst. Secur., 7 (1): 128-174 (2004)A logical specification for usage control., , , и . SACMAT, стр. 1-10. ACM, (2004)