Citation to this article as recorded by
Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750. CrossRefDirect Link |
Citation to this article as recorded by
A Critical Analysis and Treatment of Important UML Diagrams
Enhancing Modeling Power Intelligent Information Management Vol. 04, Issue 05, 231, 2012 |
State Based Static and Dynamic Formal Analysis of UML State
Diagrams Journal of Software Engineering and Applications Vol. 05, Issue 07, 483, 2012 |
Model Analysis of Equivalence Classes in UML Events
Relations Journal of Software Engineering and Applications Vol. 06, Issue 12, 653, 2013 |
How to cite this article
Z. Derakhshandeh, B.T. Ladani and N. Nematbakhsh, 2008. Modeling and Combining Access Control Policies Using Constrained Policy Graph (CPG). Journal of Applied Sciences, 8: 3561-3571.
DOI: 10.3923/jas.2008.3561.3571
URL: https://scialert.net/abstract/?doi=jas.2008.3561.3571
DOI: 10.3923/jas.2008.3561.3571
URL: https://scialert.net/abstract/?doi=jas.2008.3561.3571