Citations in impact factor journals
A Methodology and Toolkit for Deploying Reliable Security
Policies in Critical Infrastructures Security and Communication Networks |
Citation to this article as recorded by
Inconsistency Resolution Method for RBAC Based
Interoperation IEICE Transactions on Information and Systems Vol. E93-D, Issue 5, 1070, 2010 |
Integration of Systematic RBAC Security Model and UML
Model Applied Mechanics and Materials |
How to cite this article
Chao Huang, Jianling Sun, Xinyu Wang and Yuanjie Si, 2009. Security Policy Management for Systems Employing Role Based Access Control Model. Information Technology Journal, 8: 726-734.
DOI: 10.3923/itj.2009.726.734
URL: https://scialert.net/abstract/?doi=itj.2009.726.734
DOI: 10.3923/itj.2009.726.734
URL: https://scialert.net/abstract/?doi=itj.2009.726.734