Cited By
View all- Bhartiya SMehrotra DGirdhar A(2017)Proposing hierarchy-similarity based access control frameworkJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2015.08.00529:4(505-519)Online publication date: 1-Oct-2017
- Tounsi WCuppens-Boulahia NCuppens FPujolle G(2016)Access and privacy control enforcement in RFID middleware systemsWorld Wide Web10.1007/s11280-015-0325-519:1(41-68)Online publication date: 1-Jan-2016
- Krishnan PVorobyov K(2015)Enforcement of privacy requirementsComputers and Security10.1016/j.cose.2015.03.00452:C(164-177)Online publication date: 1-Jul-2015
- Show More Cited By