Session 1: Next Generation Access Control Models
Session 2: Access control policy implementation
Session 3: Access control for XML Data
Session 4: Role administration
Session 5: Constraints
Panel
Session 6: Security analysis
Session 7: Access management for distributed
Copyright
2004 ACM
Language
English
Location
A hard-copy of this is in the CERIAS Library
BibTex-formatted data
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.