Personensuche
X
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
1
BlueSky: Physical Access Control: Characteristics, Challeng..:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
2
Effective Evaluation of Relationship-Based Access Control P..:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
5
Towards a Theory for Semantics and Expressiveness Analysis ..:
, In:
?
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies ,
6
Active Learning of Relationship-Based Access Control Polici..:
, In:
?
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies ,
7
Generalized Mining of Relationship-Based Access Control Pol..:
, In:
?
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies ,
8
Mining Positive and Negative Attribute-Based Access Control..:
, In:
?
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy ,
9
Session details: Privacy:
, In:
?
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy ,
10
Security Analysis of Relationship-Based Access Control Poli..:
, In:
?
Advanced Location-Based Technologies and Services ,
11
Security and Privacy in Location-Based Services:
, In:
?
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society ,
12
Inferring Unknown Privacy Control Policies in a Social Netw..:
, In:
?
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security ,
13