Search Results
Showing Item 33 of 608
PreviousNext
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
![E-book E-book](http://biblioteca.ipicyt.edu.mx/images/format_icons/icon_format/ebook.png?cafb27)
Electronic resources
Record details
- ISBN: 9783834826183
-
Physical Description:
electronic
electronic resource
access
remote
XXI, 161 p. 25 illus. online resource. - Publisher: Wiesbaden : Springer Fachmedien Wiesbaden : 2012.
Search for related items by subject
Subject: | Computer science Data protection Data structures (Computer science) Coding theory Computer Science Systems and Data Security Data Structures Coding and Information Theory |
Search for related items by series
Search Results
Showing Item 33 of 608
PreviousNext