Login / Signup

A methodology for integrating access control policies within database development.

Jenny AbramovOmer AnsonMichal DahanPeretz ShovalArnon Sturm
Published in: Comput. Secur. (2012)
Keyphrases