PUMA publications for /author/J.H.P.%20Eloff/control%20securityhttps://puma.uni-kassel.de/author/J.H.P.%20Eloff/control%20securityPUMA RSS feed for /author/J.H.P.%20Eloff/control%20security2024-03-19T07:58:53+01:00- Building access control models with attribute explorationhttps://puma.uni-kassel.de/bibtex/27be2b4bf0987c4d18adf7243eae690c0/jaeschkejaeschke2012-12-21T10:15:28+01:00concept formal control access security exploration analysis fca attribute <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Sergei Obiedkov" itemprop="url" href="/author/Sergei%20Obiedkov"><span itemprop="name">S. Obiedkov</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Derrick G. Kourie" itemprop="url" href="/author/Derrick%20G.%20Kourie"><span itemprop="name">D. Kourie</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J.H.P. Eloff" itemprop="url" href="/author/J.H.P.%20Eloff"><span itemprop="name">J. Eloff</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Computers and Security</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">28 </span></span>(<span itemprop="issueNumber">1–2</span>):
<span itemprop="pagination">2--7</span></em> </span>(<em><span>2009<meta content="2009" itemprop="datePublished"/></span></em>)