Manuel Graña's scientific contributions

Publications (2)

Book
The rapid development of network technologies and computing machines has broadened the scope of research and development in computer science and allied areas. To provide a broad interdisciplinary research forum, the International Conference on Computational Intelligence, Cyber Security, and Computational Models (ICC3-2013) has been organized by...

Citations

... As one of the key technologies involved in providing security, access control—determining who is allowed access, when access is permitted, and where access takes place—has been widely studied [2]. Access control models, which have been widely used, include role-based access control (RBAC) and usage control (UCON) [3, 4], Internet content control (ICCON) [5], Attribute-based access control [6], and user-driven access control [7]. ...