Set cover problems in role-based access control. / Chen, L.; Crampton, J.

Proceedings of 14th European Symposium on Research in Computer Security. Springer, 2009. p. 689-704.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Set cover problems in role-based access control. / Chen, L.; Crampton, J.

Proceedings of 14th European Symposium on Research in Computer Security. Springer, 2009. p. 689-704.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Chen, L & Crampton, J 2009, Set cover problems in role-based access control. in Proceedings of 14th European Symposium on Research in Computer Security. Springer, pp. 689-704. https://doi.org/10.1007/978-3-642-04444-1_42

APA

Chen, L., & Crampton, J. (2009). Set cover problems in role-based access control. In Proceedings of 14th European Symposium on Research in Computer Security (pp. 689-704). Springer. https://doi.org/10.1007/978-3-642-04444-1_42

Vancouver

Chen L, Crampton J. Set cover problems in role-based access control. In Proceedings of 14th European Symposium on Research in Computer Security. Springer. 2009. p. 689-704 https://doi.org/10.1007/978-3-642-04444-1_42

Author

Chen, L. ; Crampton, J. / Set cover problems in role-based access control. Proceedings of 14th European Symposium on Research in Computer Security. Springer, 2009. pp. 689-704

BibTeX

@inproceedings{175fbc1757754c818176d3c1fca73bac,
title = "Set cover problems in role-based access control",
author = "L. Chen and J. Crampton",
year = "2009",
doi = "10.1007/978-3-642-04444-1_42",
language = "English",
pages = "689--704",
booktitle = "Proceedings of 14th European Symposium on Research in Computer Security",
publisher = "Springer",

}

RIS

TY - GEN

T1 - Set cover problems in role-based access control

AU - Chen, L.

AU - Crampton, J.

PY - 2009

Y1 - 2009

U2 - 10.1007/978-3-642-04444-1_42

DO - 10.1007/978-3-642-04444-1_42

M3 - Conference contribution

SP - 689

EP - 704

BT - Proceedings of 14th European Symposium on Research in Computer Security

PB - Springer

ER -