Author:
Ramasubramanian P.,Kannan A.
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference38 articles.
1. Adam N, Atluri V, Bertino E, Ferrari E (2002) A content-based authorization model for digital libraries. IEEE Trans Know Data Eng 14(2):269–315
2. Vijayalakshmi Atluri and Avigdor Gal (2002) An authorization model for temporal and derived data:securing information portals. ACM Trans Inf Syst Sec 5(1):62–94
3. Baum EB, Haussler D (1988) What size net gives valid generalization?. Neural Comput 1:151–160
4. Chandramouli R (2001) A framework for multiple authorization types in a healthcare application system. In: 17th annual computer security applications conference(ACSAC'01), December 10–14, New Orleans, Lousiana, pp 137–149
5. Chung CY, Gertz M, Levitt K (1999) Misuse detection in database systems through user profiling. In: Web proceedings of the 2nd international workshop on the recent advances in intrusion detection(RAID'99), West Lafayette, Indiana
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献