no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Author index
|
|
|
2002 |
43 |
3 |
p. 335-336 2 p. |
article |
2 |
Consistent policy enforcement in distributed systems using mobile policies
|
Chapin, Susan |
|
2002 |
43 |
3 |
p. 261-280 20 p. |
article |
3 |
Data and applications security
|
Thuraisingham, Bhavani |
|
2002 |
43 |
3 |
p. 235-236 2 p. |
article |
4 |
Editorial Board
|
|
|
2002 |
43 |
3 |
p. IFC- 1 p. |
article |
5 |
Integrating role graphs: a tool for security integration
|
Osborn, Sylvia |
|
2002 |
43 |
3 |
p. 317-333 17 p. |
article |
6 |
Protecting deductive databases from unauthorized retrieval and update requests
|
Barker, Steve |
|
2002 |
43 |
3 |
p. 293-315 23 p. |
article |
7 |
Protection and administration of XML data sources
|
Bertino, Elisa |
|
2002 |
43 |
3 |
p. 237-260 24 p. |
article |
8 |
Subject index
|
|
|
2002 |
43 |
3 |
p. 337- 1 p. |
article |
9 |
Wrappers––a mechanism to support state-based authorisation in Web applications
|
Olivier, M.S. |
|
2002 |
43 |
3 |
p. 281-292 12 p. |
article |