Author:
Wee Chee Keong,Nayak Richi
Publisher
Springer International Publishing
Reference15 articles.
1. Connolly, T.M., Begg, C.E.: A constructivist-based approach to teaching database analysis and design. J. Informat. Syst. Educat. 17(1), 43 (2006)
2. Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Depend. Secure Comput. 2(1), 2–19 (2005)
3. Dubois, É., et al.: A systematic approach to define the domain of information system security risk management. In: Intentional Perspectives on Information Systems Engineering, pp. 289–306. Springer (2010)
4. Kruk, S.R., et al.: D-FOAF: distributed identity management with access rights delegation. In: Asian Semantic Web Conference, Springer (2006)
5. Gaedke, M., Meinecke, J., Nussbaumer, M.: A modeling approach to federated identity and access management. In: Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, ACM (2005)