Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms | 15 | 1.26 | 2004 |
A New Approach To Secure Federated Information Bases Using Agent Technology | 1 | 0.42 | 2003 |
XML-Based OLAP Query Processing in a Federated Data Warehouses | 3 | 0.41 | 2003 |
Personal trusted devices for web services: revisiting multilevel security | 5 | 0.54 | 2003 |
P2P Knowledge Management: an Investigation of the Technical Architecture and Main Processes | 5 | 0.46 | 2003 |
Reusable components for developing security-aware applications | 3 | 0.55 | 2002 |
Applicability of HCI research to e government applications | 0 | 0.34 | 2001 |
Enterprise-Wide Security Administration | 2 | 0.52 | 1998 |