The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...