Toggle navigation
Publications
Researchers
Institutions
0
Sign In
Federated Authentication
(Click on the image)
Local Sign In
Password Recovery
Register
Sign In
Publications
Search
Statistics
How to Securely Break into Rbac: the Btg-Rbac Model
AuthID
P-007-SJN
7
Author(s)
Ferreira, A
·
Chadwick, D
·
Farinha, P
·
Correia, R
·
Zao, GS
·
Chilro, R
·
Antunes, L
Document Type
Proceedings Paper
Year published
2009
Published
in
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE
in
ACSAC,
ISSN: 10639527
Pages: 23-+ (2)
Conference
25Th Annual Computer Security Applications Conference,
Date:
DEC 07-11, 2009,
Location:
Honolulu, HI,
Sponsors:
Appl Comp Secur Assoc
Indexing
Wos
®
Scopus
®
Dblp
®
/en/publications/view/255573
Crossref
®
64
Google Scholar
®
Metadata
Sources
Publication Identifiers
DOI
:
10.1109/acsac.2009.12
Dblp
: conf/acsac/FerreiraCFCZCA09
Scopus
: 2-s2.0-77649181757
Wos
: WOS:000291011300003
Source Identifiers
ISSN
: 10639527
Export Publication Metadata
Export
×
Publication Export Settings
BibTex
EndNote
APA
Export Preview
Marked List
Add to Marked List
Info
At this moment we don't have any links to full text documens.
×
Select Source
This publication has:
2 records from
ISI
2 records from
SCOPUS
2 records from
DBLP
2 records from
Unpaywall
2 records from
Openlibrary
2 records from
Handle
Please select which records must be used by Authenticus!
×
Preview Publications
© 2024 CRACS & Inesc TEC - All Rights Reserved
Privacy Policy
|
Terms of Service