Understanding and developing role-based administrative models. / Crampton, Jason.

Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, 2005. p. 158-167.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Understanding and developing role-based administrative models. / Crampton, Jason.

Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, 2005. p. 158-167.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Crampton, J 2005, Understanding and developing role-based administrative models. in Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, pp. 158-167. https://doi.org/http://doi.acm.org/10.1145/1102120.1102143

APA

Crampton, J. (2005). Understanding and developing role-based administrative models. In Proceedings of the 12th ACM Conference on Computer and Communications Security (pp. 158-167). ACM Press. https://doi.org/http://doi.acm.org/10.1145/1102120.1102143

Vancouver

Crampton J. Understanding and developing role-based administrative models. In Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press. 2005. p. 158-167 https://doi.org/http://doi.acm.org/10.1145/1102120.1102143

Author

Crampton, Jason. / Understanding and developing role-based administrative models. Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, 2005. pp. 158-167

BibTeX

@inproceedings{c221131c5b794dcb87ab66e70c3d9b98,
title = "Understanding and developing role-based administrative models",
author = "Jason Crampton",
year = "2005",
doi = "http://doi.acm.org/10.1145/1102120.1102143",
language = "English",
pages = "158--167",
booktitle = "Proceedings of the 12th ACM Conference on Computer and Communications Security",
publisher = "ACM Press",

}

RIS

TY - GEN

T1 - Understanding and developing role-based administrative models

AU - Crampton, Jason

PY - 2005

Y1 - 2005

U2 - http://doi.acm.org/10.1145/1102120.1102143

DO - http://doi.acm.org/10.1145/1102120.1102143

M3 - Conference contribution

SP - 158

EP - 167

BT - Proceedings of the 12th ACM Conference on Computer and Communications Security

PB - ACM Press

ER -