1
TÍTULO: Audit-based compliance control  Full Text
AUTORES: Cederquist, JG ; Corin, R; Dekker, MAC; Etalle, S; den Hartog, JI; Lenzini, G;
PUBLICAÇÃO: 2007, FONTE: 2nd International Workshop on Formal Aspects in Security and Trust held at the 18th World Computer Congress in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, VOLUME: 6, NÚMERO: 2-3
INDEXADO EM: Scopus WOS CrossRef
2
TÍTULO: Extended privilege inheritance in RBAC
AUTORES: Dekker, MAC; Cederquist, JG ; Crampton, J; Etalle, S;
PUBLICAÇÃO: 2007, FONTE: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
INDEXADO EM: Scopus CrossRef