//-->
Semantic mapping for access control model
Zhao, Yi, (2011)
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher, (2011)
Digital identity management : perspectives on the technological, business and social implications
Birch, David G. W., (2007)
An Encryption Methodology for Enabling the Use of Data Warehouses on the Cloud
Lopes, Claudivan Cruz, (2018)
My AI or Five Theses About Artificial Intelligence After Its 50th Birthday
Matwin, Stan, (2007)
A systematic approach to web application penetration testing using TTCN-3
Stepien, Bernard, (2011)