• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4595849)   Today's Articles (42)   Subscriber (49336)
For: Winslett M, Ching N, Jones V, Slepchin I. Using digital credentials on the World Wide Web. JCS 1997. [DOI: 10.3233/jcs-1997-5307] [Citation(s) in RCA: 29] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Number Cited by Other Article(s)
1
Access control and privacy in web‐based social networks. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS 2008. [DOI: 10.1108/17440080810919468] [Citation(s) in RCA: 22] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
2
Stoupa K, Vakali A. Clustering subjects in a credential-based access control framework. Comput Secur 2007. [DOI: 10.1016/j.cose.2006.08.006] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
3
Samarati P, Reiter MK, Jajodia S. An authorization model for a public key management service. ACTA ACUST UNITED AC 2001. [DOI: 10.1145/503339.503343] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
4
Data security. DATA KNOWL ENG 1998. [DOI: 10.1016/s0169-023x(97)00049-9] [Citation(s) in RCA: 20] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA