|
Volumn 13, Issue 8, 2002, Pages 1521-1527
|
Role-based authorization constraint with time character
a
|
Author keywords
Access control; Constraint; Information security; Role; Time character
|
Indexed keywords
ALGORITHMS;
COMPUTER NETWORKS;
CONSTRAINT THEORY;
MATHEMATICAL MODELS;
ACCESS CONTROL;
AUTHORIZATION;
SECURITY OF DATA;
|
EID: 0036700077
PISSN: 10009825
EISSN: None
Source Type: Journal
DOI: None Document Type: Article |
Times cited : (19)
|
References (5)
|