Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 1.

Conference or workshop item

Ferreira, A. and Chadwick, D.W. and Farinha, P. and Correia, R. and Zao, G. and Chilro, R. and Antunes, L. (2009) How to securely break into RBAC: the BTG-RBAC model. In: Computer Security Applications Conference, 2009. ACSAC'09. Annual.

This list was generated on Fri Mar 8 06:23:25 2013 GMT.