Login
中文
Role-based Access Control
Related Fields
Anything in here will be replaced on browsers that support the canvas element
Data security
The Internet
Web service
Computational model
Database
Distributed computing
Unified Modeling Language
Computer Science
Computer security
Security policy
Authentication
Computer network
Cryptography
Separation of duties
Access control
Operating system
Computer security model
XML
Theory of computation
Application software
Data mining
Information security
Privacy
Information system
Authorization
Parent Topic:
Authorization
,
Access control
,
Computer Science
,
Computer security
,
Information technology
,
Information security
Top Authors:
Ravi Sandhu
Elisa Bertino
Makoto Takizawa
Tomoya Enokido
Jason Crampton
Hua Wang
Mark Strembeck
David W Chadwick
Gailjoon Ahn
Arif Ghafoor
Sylvia L Osborn
Ruixuan Li
James B D Joshi
David F Ferraiolo
Ken Moody
Zhengding Lu
Cungang Yang
Ninghui Li
Jaideep Vaidya
Jean Bacon
Jianfeng Lu
Steven A Demurjian
Yanchun Zhang
Shihchien Chou
John Barkley
Jinli Cao
Nora Cuppensboulahia
Xiaopu Ma
Shamik Sural
D Richard Kuhn
Karsten Sohr
David Basin
Chang N Zhang
Jianming Yong
Edward J Coyne
Indrakshi Ray
James Joshi
David Eyers
Konstantin Beznosov
Alessandro Colantonio
Maria Luisa Damiani
Valbona Barolli
Axel Kern
Duminda Wijesekera
Chao Huang
Rafae Bhatti
Xinyu Wang
William H Winsborough
Anne Baumgrass
Yuqing Sun
Paper Map
More
Author Map (v2)
More
Mentorship Map
More
Mentorship Hierachical Map
More
Paper Recommendation