Personensuche
X
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
1
Generalized Noise Role Mining:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
3
Valued Authorization Policy Existence Problem:
, In:
?
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies ,
7
Bounded and Approximate Strong Satisfiability in Workflows:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
9
The Authorization Policy Existence Problem:
, In:
?
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies ,
10
Attribute Expressions, Policy Tables and Attribute-Based Ac..:
, In:
?
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies ,
11
On the Satisfiability of Workflows with Release Points:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
12
Canonical Completeness in Lattice-Based Languages for Attri..:
, In:
?
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies ,
13
A Framework for the Cryptographic Enforcement of Informatio..:
, In:
?
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies ,
14
Resiliency Policies in Access Control Revisited:
, In:
?
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies ,
15