(2012). Information flow based security control beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC). Spinger-Verlag.
Chicago Style CitationInformation Flow Based Security Control Beyond RBAC: How to Enable Fine-grained Security Policy Enforcement in Business Processes Beyond Limitations of Role-based Access Control (RBAC). Spinger-Verlag, 2012.
MLA CitationInformation Flow Based Security Control Beyond RBAC: How to Enable Fine-grained Security Policy Enforcement in Business Processes Beyond Limitations of Role-based Access Control (RBAC). Spinger-Verlag, 2012.
Warning: These citations may not always be 100% accurate.