![]() |
| 2003 | ||
|---|---|---|
| 3 | EE | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai: Certificate-based authorization policy in a PKI environment. ACM Trans. Inf. Syst. Secur. 6(4): 566-588 (2003) |
| 1998 | ||
| 2 | EE | Srilekha Mudumbai, Kshitij Shah, Amit P. Sheth, Krishnan Parasuraman, Clemens Bertram: ZEBRA Image Access System. ICDE 1998: 602 |
| 1 | EE | William E. Johnston, Srilekha Mudumbai, Mary R. Thompson: Authorization and Attribute Certificates for Widely Distributed Access Control. WETICE 1998: 340-345 |
| 1 | Clemens Bertram | [2] |
| 2 | Abdelilah Essiari | [3] |
| 3 | William E. Johnston | [1] |
| 4 | Krishnan Parasuraman | [2] |
| 5 | Kshitij Shah | [2] |
| 6 | Amit P. Sheth | [2] |
| 7 | Mary R. Thompson | [1] [3] |