- Publications
- Search
- Statistics
How to Securely Break into Rbac: the Btg-Rbac Model
AuthID
P-007-SJN
P-007-SJN
7
Author(s)
Document Type
Proceedings Paper
Year published
2009
Published
in 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ISSN: 10639527
Pages: 23-+ (2)
Conference
25Th Annual Computer Security Applications Conference, Date: DEC 07-11, 2009, Location: Honolulu, HI, Sponsors: Appl Comp Secur Assoc
Publication Identifiers
Dblp: conf/acsac/FerreiraCFCZCA09
Scopus: 2-s2.0-77649181757
Wos: WOS:000291011300003
Source Identifiers
ISSN: 10639527
Export Publication Metadata
Publication Export Settings
Marked List
Citations
Oops! It looks like you don't have access to this content.
This section is restricted to uses with b-on access.
CORE Conference
No information about CORE Rank
During the preprocessing phase, only publications of type 'Proceedings Paper' or 'Proceedings' are automatically processed to identify their CORE Rank.
TIP: If your publication's CORE Rank is missing, you can contact with your institutional manager to have the correct ranking manually added to the record.
Journal Factors
Oops! It looks like you don't have access to this content.
This section is restricted to uses with b-on access.
Info
At this moment we don't have any links to full text documens.