메뉴 건너뛰기




Volumn , Issue , 2001, Pages 131-139

Managing access control complexity using metrics

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER PROGRAMMING LANGUAGES; CONSTRAINT THEORY; GRAPH THEORY;

EID: 0035790630     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (19)
  • 3
    • 84974776848 scopus 로고
    • The extended schematic protection model
    • P. E. Ammann and R. S. Sandhu. The extended schematic protection model. Journal of Computer Security, vol. 1, pages 335-383, 1992.
    • (1992) Journal of Computer Security , vol.1 , pp. 335-383
    • Ammann, P.E.1    Sandhu, R.S.2
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Feb.
    • E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information System Security, 1(2), Feb. 1999.
    • (1999) ACM Transactions on Information System Security , vol.1 , Issue.2
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 13
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • March
    • G. Miller. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63(2), March 1956.
    • (1956) Psychological Review , vol.63 , Issue.2
    • Miller, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.