Computer access control (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Computer access control" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
1st place
1st place
1,060th place
700th place
355th place
454th place
207th place
136th place
low place
6,271st place
102nd place
76th place
low place
low place
5,386th place
4,042nd place

brucker.ch

doi.org

  • Marcon, A. L.; Olivo Santin, A.; Stihler, M.; Bachtold, J., "A UCONabc Resilient Authorization Evaluation for Cloud Computing," Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 457–467, Feb. 2014 doi:10.1109/TPDS.2013.113, bottom
  • Ferreira, Ana; Chadwick, David; Farinha, Pedro; Correia, Ricardo; Zao, Gansen; Chiro, Rui; Antunes, Luis (2009). "How to Securely Break into RBAC: The BTG-RBAC Model". Computer Security Applications Conference (ACSAC). IEEE. pp. 23–31. doi:10.1109/ACSAC.2009.12. hdl:10216/21676.
  • Brucker, Achim D.; Petritsch, Helmut (2009). "Extending Access Control Models with Break-glass.". ACM symposium on access control models and technologies (SACMAT). ACM Press. pp. 197–206. doi:10.1145/1542207.1542239.

handle.net

hdl.handle.net

  • Ferreira, Ana; Chadwick, David; Farinha, Pedro; Correia, Ricardo; Zao, Gansen; Chiro, Rui; Antunes, Luis (2009). "How to Securely Break into RBAC: The BTG-RBAC Model". Computer Security Applications Conference (ACSAC). IEEE. pp. 23–31. doi:10.1109/ACSAC.2009.12. hdl:10216/21676.

nist.gov

csrc.nist.gov

oasis-open.org

lists.oasis-open.org

pcmag.com

psu.edu

citeseerx.ist.psu.edu

redhat.com

access.redhat.com

web.archive.org