Výsledky vyhledávání - "Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security"
-
1
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Popis souboru: application/pdf
-
2
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
3
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
4
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Popis souboru: application/pdf
-
5
Autoři:
Zdroj: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 12 Issue 2, p20:1-20:34, 34p, 4 Diagrams, 4 Charts
Nájsť tento článok vo Web of Science