111 | Add to Reading ListSource URL: apdesign.k-state.eduLanguage: English - Date: 2016-03-23 16:11:16
|
---|
112 | Add to Reading ListSource URL: wyolotto.comLanguage: English - Date: 2016-04-21 12:06:42
|
---|
113 | Add to Reading ListSource URL: psc.ky.govLanguage: English - Date: 2013-10-29 08:59:50
|
---|
114 | Add to Reading ListSource URL: secure.toolkitfiles.co.uk- Date: 2015-12-09 04:50:10
|
---|
115 | Add to Reading ListSource URL: apt.cs.manchester.ac.ukLanguage: English - Date: 2014-05-13 09:16:28
|
---|
116 | Add to Reading ListSource URL: profsandhu.comLanguage: English - Date: 2013-07-22 19:39:21
|
---|
117 | Add to Reading ListSource URL: www.bradycorp.comLanguage: English - Date: 2016-02-09 13:21:10
|
---|
118 | |
---|
119 | Role Hierarchies and Constraints for Lattice-Based Access Controls Ravi Sandhu* George Mason University & SETA Corporation~* A b s t r a c t Role-based access control (RBAC) is a promising alternative toAdd to Reading ListSource URL: www.profsandhu.comLanguage: English - Date: 2013-07-22 19:39:21
|
---|
120 | A DAM B ELAY 736 Escondido Road, Apt. 127 Stanford, CAEDUCATIONAdd to Reading ListSource URL: www.scs.stanford.eduLanguage: English - Date: 2016-01-02 20:09:14
|
---|