Search results for: Ravi Sandhu
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems: OTM 2008 > Information Security (IS) 2008 International Conference > 937-937
Lecture Notes in Computer Science > Protecting Persons While Protecting the People > Section Three: Practical Approaches to the Problem > 115-121
Lecture Notes in Computer Science > Data and Applications Security XXI > Temporal Access Control and Usage Control > 227-242
Lecture Notes in Computer Science > Data and Applications Security XXI > Cryptographic-Based Security > 144-160
IFIP — The International Federation for Information Processing > Data and Applications Security XVII > Access Control Models and Technologies > 330-343
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Malware and Email Security > 20-34
IFIP — The International Federation for Information Processing > Data and Applications Security XVII > Access Control Models and Technologies > 330-343
IFIP — The International Federation for Information Processing > Research Directions in Data and Applications Security XVIII > Access Control > 15-29
IFIP — The International Federation for Information Processing > Trust Management III > Information Sharing > 164-175
IEEE Transactions on Reliability > 2015 > 64 > 3 > 1068 - 1077
Concurrency and Computation: Practice and Experience > 27 > 11 > 2851 - 2868
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 2 > 308 - 320