Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 1.

Conference or workshop item

Ferreira, A. and Chadwick, D.W. and Farinha, P. and Cruz-Correia, R. and Zhao, G. and Chilro, R. and Antunes, L. (2009) How to securely break into RBAC: the BTG-RBAC model. In: Computer Security Applications Conference, 2009. ACSAC'09. Annual, December 7–11, 2009, Honolulu, Hawaii, USA. (Full text available)

This list was generated on Fri Mar 7 15:52:09 2014 GMT.