| 2005 | ||
|---|---|---|
| 9 | Matunda Nyanchama: Enterprise Vulnerability Management and Its Role in Information Security Management. Information Systems Security 14(3): 29-56 (2005) | |
| 2003 | ||
| 8 | Matunda Nyanchama, Marc Stefaniu: Analyzing Enterprise Network Vulnerabilities. Information Systems Security 12(2): 44-49 (2003) | |
| 2001 | ||
| 7 | Matunda Nyanchama, Paul Sop: Enterprise Security Management: Managing Complexity. Information Systems Security 9(6): 1-8 (2001) | |
| 1999 | ||
| 6 | Matunda Nyanchama, Sylvia L. Osborn: The Role Graph Model and Conflict of Interest. ACM Trans. Inf. Syst. Secur. 2(1): 3-33 (1999) | |
| 1995 | ||
| 5 | Matunda Nyanchama, Sylvia L. Osborn: The role graph model. ACM Workshop on Role-Based Access Control 1995 | |
| 4 | Matunda Nyanchama, Sylvia L. Osborn: Modeling Mandatory Access Control in Role-Based Security Systems. DBSec 1995: 129-144 | |
| 1994 | ||
| 3 | Matunda Nyanchama, Sylvia L. Osborn: Access Rights Administration in Role-Based Security Systems. DBSec 1994: 37-56 | |
| 1993 | ||
| 2 | Matunda Nyanchama, Sylvia L. Osborn: Role-Based Security, Object Oriented Databases & Separation of Duty. SIGMOD Record 22(4): 45-51 (1993) | |
| 1992 | ||
| 1 | Matunda Nyanchama, Sylvia L. Osborn: Database Security Issues in Distributed Object-Oriented Databases. IWDOM 1992: 92-97 | |
| 1 | Sylvia L. Osborn | [1] [2] [3] [4] [5] [6] |
| 2 | Paul Sop | [7] |
| 3 | Marc Stefaniu | [8] |