ACCESS CONTROL MODELS
Experts
- Ravi S. Sandhu
- Elisa Bertino
- Elena Ferrari
- Pierangela Samarati
- Jason Crampton
- Indrakshi Ray
- Fabio Martinelli
- Frédéric Cuppens
- Gail-Joon Ahn
- Paolo Mori
- Nora Cuppens-Boulahia
- Sabrina De Capitani di Vimercati
- Wouter Joosen
- Aneta Poniszewska-Maranda
- Silvio Ranise
- Trent Jaeger
- Barbara Carminati
- Vijay Varadharajan
- Hitoshi Kiya
- Ninghui Li
- Jan H. P. Eloff
- Duminda Wijesekera
- Mahesh V. Tripunitara
- Andrea Saracino
- Steve Barker
- Hua Wang
- David W. Chadwick
- Martín Abadi
- Yi Mu
- Makoto Takizawa
- Nicola Zannone
- Valerio Genovese
- Sushil Jajodia
- Ernesto Damiani
- Tomoya Enokido
- Antonio Fernandez Gómez-Skarmeta
- Lujo Bauer
- Bhavani M. Thuraisingham
- Eda Marchetti
Venues
- CoRR
- SACMAT
- Comput. Secur.
- DBSec
- IEEE Access
- IACR Cryptol. ePrint Arch.
- TrustBus
- PST
- Future Gener. Comput. Syst.
- ICC
- Sensors
- ARES
- ACM Trans. Inf. Syst. Secur.
- TrustCom
- IEEE Internet Things J.
- IEEE Trans. Dependable Secur. Comput.
- GLOBECOM
- SECRYPT
- ACSAC
- WETICE
- IEEE Symposium on Security and Privacy
- CODASPY
- POLICY
- ESORICS
- CCS
- INFOCOM
- ICISS
- Wirel. Pers. Commun.
- Concurr. Comput. Pract. Exp.
- ACM Workshop on Role-Based Access Control
- ISC
- ISCC
- SEC
- VTC Fall
- Comput. Networks
- SAC
- AsiaCCS
- IEEE Trans. Consumer Electron.
- J. Comput. Secur.
Related Topics
Related Keywords
Popularity
No popularities found. Try to change the filters.
Popularity Trend