Cited By
View all- Gupta MSharman R(2011)Incorporating social-cultural contexts in role engineering: an activity theoretic approachInternational Journal of Business Information Systems10.1504/IJBIS.2011.0372977:1(60-77)Online publication date: 1-Dec-2011
- Thomsen DSandhu RBertino E(2011)Practical policy patternsProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943543(225-230)Online publication date: 21-Feb-2011
- Vaidya J(2010)Automating security configuration and administrationProceedings of the 5th international conference on Advances in information and computer security10.5555/1927197.1927199(1-9)Online publication date: 22-Nov-2010
- Show More Cited By