Cited By
View all- Shields BMolloy O(2018)Creating and enforcing access control policies using description logic techniquesInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2011.0412953:3(253-278)Online publication date: 13-Dec-2018
- Fatima AGhazi YShibli MAbassi A(2016)Towards Attribute-Centric Access ControlSecurity and Communication Networks10.1002/sec.15209:16(3152-3166)Online publication date: 10-Nov-2016