Toggle navigation
Publicações
Investigadores
Instituições
0
Entrar
Autenticação Federada
(Click on the image)
Autenticação local
Recuperação de Password
Register
Entrar
Publicações
Procurar
Estatísticas
How to Securely Break into Rbac: the Btg-Rbac Model
AuthID
P-007-SJN
7
Author(s)
Ferreira, A
·
Chadwick, D
·
Farinha, P
·
Correia, R
·
Zao, GS
·
Chilro, R
·
Antunes, L
Document Type
Proceedings Paper
Year published
2009
Published
in
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE
in
ACSAC,
ISSN: 10639527
Pages: 23-+ (2)
Conference
25Th Annual Computer Security Applications Conference,
Date:
DEC 07-11, 2009,
Location:
Honolulu, HI,
Sponsors:
Appl Comp Secur Assoc
Indexing
Wos
®
Scopus
®
Dblp
®
/pt/publications/view/255573
Crossref
®
64
Google Scholar
®
Metadata
Sources
Publication Identifiers
DOI
:
10.1109/acsac.2009.12
Dblp
: conf/acsac/FerreiraCFCZCA09
Scopus
: 2-s2.0-77649181757
Wos
: WOS:000291011300003
Source Identifiers
ISSN
: 10639527
Export Publication Metadata
Export
×
Publication Export Settings
BibTex
EndNote
APA
Export Preview
Lista
Marked
Adicionar à lista
Marked
Info
At this moment we don't have any links to full text documens.
×
Select Source
This publication has:
2 records from
ISI
2 records from
SCOPUS
2 records from
DBLP
2 records from
Unpaywall
Please select which records must be used by Authenticus!
×
Preview Publications
© 2024 CRACS & Inesc TEC - All Rights Reserved
Privacy Policy
|
Terms of Service