Author:
Sabzevar Alireza Pirayesh,Sousa João Pedro
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems 10, 102 (1992)
2. Snyder Jr., G.F., Pardoe, T.: Network Security. Delmar Cengage Learning (2004)
3. Barkley, J., Beznosov, K., Uppal, J.: Supporting relationships in access control using role based access control. In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, pp. 55–65. ACM, New York (1999)
4. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3, 85–106 (2000)
5. Pearl, J.: Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann, San Francisco (1988)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A conceptual model of security context;International Journal of Information Security;2014-03-08