Personensuche
X
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
2
Generalized Noise Role Mining:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
5
Valued Authorization Policy Existence Problem:
, In:
?
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies ,
13