|
Volumn , Issue , 2004, Pages 19-28
|
Modeling complex systems by separating application and security concerns
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTATIONAL COMPLEXITY;
COMPUTER SIMULATION;
COMPUTER SOFTWARE;
DATA COMMUNICATION SYSTEMS;
DATABASE SYSTEMS;
ELECTRONIC COMMERCE;
SECURITY OF DATA;
AUTHORIZATION VIOLATION;
COLLABORATION MODELING;
SYSTEM COMPLEXITY;
SYSTEM PENETRATION;
LARGE SCALE SYSTEMS;
|
EID: 4444362674
PISSN: 27708527
EISSN: 27708535
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (19)
|
References (19)
|