Author of the publication

Panel: which access control technique will provide the greatest overall benefit-Abstract.

, , , , , and . SACMAT, page 141. ACM, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Matter of Policy., , and . IT Professional, 14 (2): 4-7 (2012)Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)., , , and . ABAC@CODASPY, page 13-24. ACM, (2016)Imposing Fine-grain Next Generation Access Control over Database Queries., , , and . ABAC@CODASPY, page 9-15. ACM, (2017)On the Formal Definition of Separation-of-Duty Policies and their Composition., , and . IEEE Symposium on Security and Privacy, page 172-183. IEEE Computer Society, (1998)Access Control Policy Combinations for the Grid Using the Policy Machine., , and . CCGRID, page 225-232. IEEE Computer Society, (2007)Role-Based Access Controls, and . CoRR, (2009)Pseudo-Exhaustive Testing of Attribute Based Access Control Rules., , , , and . ICST Workshops, page 51-58. IEEE Computer Society, (2016)Specifying and managing role-based access control within a corporate intranet., and . ACM Workshop on Role-Based Access Control, page 77-82. ACM, (1997)User's Perspectives (Panel Session).. ACM Workshop on Role-Based Access Control, page 67. ACM, (1999)A trust domain management schema for multiple grid environments., , , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 17. ACM, (2007)