Author:
Cohen D.,Crampton J.,Gutin G.,Wahlström M.
Reference47 articles.
1. American National Standards Institute. in ANSI INCITS 359-2004 for Role Based Access Control (2004)
2. A. Armando, S. Ponta, Model checking of security-sensitive business processes, in eds. By P. Degano, J.D. Guttman, Formal Aspects in Security and Trust. Lecture Notes in Computer Science, vol. 5983 (Springer, 2009), pp. 66–80
3. L. Barto, M. Kozik, Constraint satisfaction problems solvable by local consistency methods. J. ACM 61(1), 3 (2014)
4. D.A. Basin, S.J. Burri, G. Karjoth, Obstruction-free authorization enforcement: aligning security with business objectives, in CSF (IEEE Computer Society, 2011), pp. 99–113
5. N. Beldiceanu, M. Carlsson, J.-X. Rampon, Global Constraint Catalog, 2nd edn. (revision a). Technical Report T2012:03, Swedish Institute of Computer Science (2012)