Dezentrale Rollenbasierte Autorisierung und Administrierung

作者: Mario Lischka

DOI: 10.17877/DE290R-968

关键词:

摘要:

参考文章(60)
Theorie der einfachen Ungleichungen. Crelle's Journal. ,vol. 1902, pp. 1- 27 ,(1902) , 10.1515/CRLL.1902.124.1
Peter H. Starke, Analyse von Petri-Netz-Modellen Vieweg+Teubner Verlag. ,(1990) , 10.1007/978-3-663-09262-9
Erich Kosiol, Organisation der Unternehmung Gabler Verlag. ,(1976) , 10.1007/978-3-322-90032-6
Bruce Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) fast software encryption. pp. 191- 204 ,(1993) , 10.1007/3-540-58108-1_24
Peter Herrmann, Trust-Based Protection of Software Component Users and Designers Lecture Notes in Computer Science. pp. 75- 90 ,(2003) , 10.1007/3-540-44875-6_6
Hartmann J. Genrich, Kurt Lautenbach, The Analysis of Distributed Systems by Means of Predicate ? Transition-Nets Proceedings of the International Sympoisum on Semantics of Concurrent Computation. pp. 123- 147 ,(1979) , 10.1007/BFB0022467
Michael Schiffers, Horst Wedde, Analyzing program solutions of coordination problems by cp-nets mathematical foundations of computer science. pp. 462- 473 ,(1978) , 10.1007/3-540-08921-7_94
Serge Haddad, Claude Girault, Algebraic structure of flows of a regular coloured net applications and theory of petri nets. pp. 73- 88 ,(1986) , 10.1007/3-540-18086-9_20
Matunda Nyanchama, Sylvia L. Osborn, Access Rights Administration in Role-Based Security Systems Proceedings of the IFIP WG11.3 Working Conference on Database Security VII. pp. 37- 56 ,(1994)
Vladimir Lifschitz, Michael Gelfond, The stable model semantics for logic programming international conference on lightning protection. pp. 1070- 1080 ,(1988)