Browse by Person (creator, editor, contributor, etc.)
Number of items: 1.
Conference or workshop item
Ferreira, A. and Chadwick, D.W. and Farinha, P. and Cruz-Correia, R. and Zhao, G. and Chilro, R. and Antunes, L.
How to securely break into RBAC: the BTG-RBAC model.
In: Computer Security Applications Conference, 2009. ACSAC'09. Annual, December 7–11, 2009, Honolulu, Hawaii, USA.
(Full text available)