S. Etalle
AuthID: R-006-SC3
1
TITLE: Audit-based compliance control Full Text
AUTHORS: Cederquist, JG ; Corin, R; Dekker, MAC; Etalle, S; den Hartog, JI; Lenzini, G;
PUBLISHED: 2007, SOURCE: 2nd International Workshop on Formal Aspects in Security and Trust held at the 18th World Computer Congress in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, VOLUME: 6, ISSUE: 2-3
AUTHORS: Cederquist, JG ; Corin, R; Dekker, MAC; Etalle, S; den Hartog, JI; Lenzini, G;
PUBLISHED: 2007, SOURCE: 2nd International Workshop on Formal Aspects in Security and Trust held at the 18th World Computer Congress in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, VOLUME: 6, ISSUE: 2-3
2
TITLE: Extended privilege inheritance in RBAC
AUTHORS: Dekker, MAC; Cederquist, JG ; Crampton, J; Etalle, S;
PUBLISHED: 2007, SOURCE: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
AUTHORS: Dekker, MAC; Cederquist, JG ; Crampton, J; Etalle, S;
PUBLISHED: 2007, SOURCE: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
INDEXED IN: Scopus CrossRef