Cited By
View all- Byun JSohn YBertino EFerraiolo DRay I(2006)Systematic control and management of data integrityProceedings of the eleventh ACM symposium on Access control models and technologies10.1145/1133058.1133074(101-110)Online publication date: 7-Jun-2006
- Shim Y(2006)Distributed processing of context-aware authorization in ubiquitous computing environmentsProceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II10.1007/11751588_14(125-134)Online publication date: 8-May-2006
- Liu CMcLean POzols M(2005)Combining logics for modelling security policiesProceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 3810.5555/1082161.1082197(323-332)Online publication date: 1-Jan-2005
- Show More Cited By