1
TITLE: How to securely break into RBAC: the BTG-RBAC model
AUTHORS: Ferreira, A ; Chadwick, D; Farinha, P ; Correia, R ; Zao, GS; Chilro, R; Antunes, L ;
PUBLISHED: 2009, SOURCE: 25th Annual Computer Security Applications Conference in 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE
INDEXED IN: Scopus WOS DBLP CrossRef: 64