Personensuche
X
?
Proceedings of the 2006 ACM Symposium on Information, computer and communications security ,
4
Safety analysis of usage control authorization models:
, In:
?
Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications ,
11
Risky trust : risk-based analysis of software systems:
, In:
?
12
Graph Transformations
Second International Conference, ICGT 2004, Rome, Italy, Se...
Lecture Notes in Computer Science ; 3256
?
Proceedings of the ninth ACM symposium on Access control models and technologies ,
13
A logical specification for usage control:
, In:
?
Proceedings of the 2003 ACM workshop on Formal methods in security engineering ,
15