Author:
Altamimi Ahmad,Eavis Todd
Publisher
Springer International Publishing
Reference19 articles.
1. Altamimi, A., Eavis, T.: Securing Access to Data in Business Intelligence Domains. J. International Journal on Advances in Security 5, 94–111 (2012)
2. Khajaria, K., Kumar, M.: Modeling of security requirements for decision information systems. J. SIGSOFT Softw. Eng. Notes 36, 1–4 (2011)
3. Lecture Notes in Computer Science;M. Dell’Amico,2012
4. Becker, M., Fournet, C., Gordon, A.: SecPAL: Design and semantics of a decentralized authorization language. J. Comput. Secur. 18, 619–665 (2010)
5. Lecture Notes in Computer Science;N. Damianou,2001