2005 | ||
---|---|---|
9 | Matunda Nyanchama: Enterprise Vulnerability Management and Its Role in Information Security Management. Information Systems Security 14(3): 29-56 (2005) | |
2003 | ||
8 | Matunda Nyanchama, Marc Stefaniu: Analyzing Enterprise Network Vulnerabilities. Information Systems Security 12(2): 44-49 (2003) | |
2001 | ||
7 | Matunda Nyanchama, Paul Sop: Enterprise Security Management: Managing Complexity. Information Systems Security 9(6): 1-8 (2001) | |
1999 | ||
6 | Matunda Nyanchama, Sylvia L. Osborn: The Role Graph Model and Conflict of Interest. ACM Trans. Inf. Syst. Secur. 2(1): 3-33 (1999) | |
1995 | ||
5 | Matunda Nyanchama, Sylvia L. Osborn: The role graph model. ACM Workshop on Role-Based Access Control 1995 | |
4 | Matunda Nyanchama, Sylvia L. Osborn: Modeling Mandatory Access Control in Role-Based Security Systems. DBSec 1995: 129-144 | |
1994 | ||
3 | Matunda Nyanchama, Sylvia L. Osborn: Access Rights Administration in Role-Based Security Systems. DBSec 1994: 37-56 | |
1993 | ||
2 | Matunda Nyanchama, Sylvia L. Osborn: Role-Based Security, Object Oriented Databases & Separation of Duty. SIGMOD Record 22(4): 45-51 (1993) | |
1992 | ||
1 | Matunda Nyanchama, Sylvia L. Osborn: Database Security Issues in Distributed Object-Oriented Databases. IWDOM 1992: 92-97 |
1 | Sylvia L. Osborn | [1] [2] [3] [4] [5] [6] |
2 | Paul Sop | [7] |
3 | Marc Stefaniu | [8] |