1
TÍTULO: How to securely break into RBAC: the BTG-RBAC model
AUTORES: Ferreira, A ; Chadwick, D; Farinha, P ; Correia, R ; Zao, GS; Chilro, R; Antunes, L ;
PUBLICAÇÃO: 2009, FONTE: 25th Annual Computer Security Applications Conference in 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE
INDEXADO EM: Scopus WOS DBLP CrossRef: 64