Observing access control policies using scrabble games
暂无分享,去创建一个
Siti Zaleha Zainal Abidin | Suzana Ahmad | Stephan Reiff-Marganiec | Nasiroh Omar | S. Reiff-Marganiec | N. Omar | S. Z. Abidin | Suzana Ahmad
[1] Scott F. Smith,et al. Modular Internet Programming with Cells , 2002, ECOOP.
[2] Sabrina De Capitani di Vimercati,et al. Access Control Policies, Models, and Mechanisms , 2011, Encyclopedia of Cryptography and Security.
[3] Sita Zaleha Zainal Abidin. Interaction and interest management in a scripting language , 2006 .
[4] Nasiroh Omar,et al. Data sharing in networked environments: organization, platforms and issues , 2011 .
[5] Min Chen,et al. Designing interaction protocols using noughts and crosses type games , 2007, J. Netw. Comput. Appl..
[6] Richard L. Drechsler,et al. The Yoix Scripting Language as a Tool for Building Web-Based Systems , 2002, NETWORKING Workshops.
[7] Peter Van Roy,et al. Mobile objects in distributed Oz , 1997, TOPL.
[8] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[9] Elisa Bertino,et al. A Trust-Based Context-Aware Access Control Model for Web-Services , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[10] Boris Magnusson,et al. ECOOP 2002 — Object-Oriented Programming , 2002, Lecture Notes in Computer Science.