2003 | ||
---|---|---|
3 | EE | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai: Certificate-based authorization policy in a PKI environment. ACM Trans. Inf. Syst. Secur. 6(4): 566-588 (2003) |
1998 | ||
2 | EE | Srilekha Mudumbai, Kshitij Shah, Amit P. Sheth, Krishnan Parasuraman, Clemens Bertram: ZEBRA Image Access System. ICDE 1998: 602 |
1 | EE | William E. Johnston, Srilekha Mudumbai, Mary R. Thompson: Authorization and Attribute Certificates for Widely Distributed Access Control. WETICE 1998: 340-345 |
1 | Clemens Bertram | [2] |
2 | Abdelilah Essiari | [3] |
3 | William E. Johnston | [1] |
4 | Krishnan Parasuraman | [2] |
5 | Kshitij Shah | [2] |
6 | Amit P. Sheth | [2] |
7 | Mary R. Thompson | [1] [3] |