Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Role-based access control models
Computer (Long Beach, Calif.), 1996-02, Vol.29 (2), p.38-47
1996

Lattice-based access control models
Computer (Long Beach, Calif.), 1993-11, Vol.26 (11), p.9-19
1993

Nutrition research (New York, N.Y.), 1997-04, Vol.17 (4), p.703-711
1997
Link zum Volltext

Indian journal of industrial relations, 2011-10, Vol.47 (2), p.329-340
2011
Link zum Volltext

IEEE transactions on software engineering, 1989-12, Vol.15 (12), p.1518-1525
1989

Proceedings of the Sixth International Lectin Meeting, Poznan, Poland, September 2–6, 1984, 2020, Vol.4, p.559-566
Originally published 1985, 2020
Link zum Volltext

Molecular and cellular biochemistry, 1997, Vol.166 (1/2), p.1-9
1997
Link zum Volltext

Medical mycology (Oxford), 1965, Vol.4 (2), p.71-79
1965
Link zum Volltext

IEEE transactions on knowledge and data engineering, 1996-02, Vol.8 (1), p.16-31
1996


Proceedings 1995 IEEE Symposium on Security and Privacy, 1995, p.128-142
1995

Tenth Annual Computer Security Applications Conference, 1994, p.54-62
1994

Proceedings 13th Annual Computer Security Applications Conference, 1997, p.164-174
1997


Proceedings of 9th Annual Computer Security Applications Conference, 1993, p.184-194
1993

International journal for numerical and analytical methods in geomechanics, 1988, Vol.12 (6), p.627-637
1988
Link zum Volltext

[1992] Proceedings Eighth Annual Computer Security Application Conference, 1992, p.131-140
1992

Ikushugaku zasshi, 1975-02, Vol.25 (1), p.65-71
1975
Link zum Volltext

The typed access matrix model
Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992, p.122-136
1992

Applied microbiology and biotechnology, 1984-12, Vol.20 (6), p.427-429
1984
Link zum Volltext

Soil dynamics and earthquake engineering (1984), 1987, Vol.6 (2), p.70-74
1987
Link zum Volltext

Dust suppression in mines
1962
Link zum Volltext


[1990] Proceedings of the Sixth Annual Computer Security Applications Conference, 1990, p.340-348
1990

Proceedings The Computer Security Foundations Workshop VII, 1994, p.66-79
1994
Suchergebnisse filtern
Filter anzeigen
Erscheinungsjahr
n.n
n.n