 | 2005 |
9 |  | Matunda Nyanchama:
Enterprise Vulnerability Management and Its Role in Information Security Management.
Information Systems Security 14(3): 29-56 (2005) |
| 2003 |
8 |  | Matunda Nyanchama,
Marc Stefaniu:
Analyzing Enterprise Network Vulnerabilities.
Information Systems Security 12(2): 44-49 (2003) |
| 2001 |
7 |  | Matunda Nyanchama,
Paul Sop:
Enterprise Security Management: Managing Complexity.
Information Systems Security 9(6): 1-8 (2001) |
| 1999 |
6 |  | Matunda Nyanchama,
Sylvia L. Osborn:
The Role Graph Model and Conflict of Interest.
ACM Trans. Inf. Syst. Secur. 2(1): 3-33 (1999) |
| 1995 |
5 |  | Matunda Nyanchama,
Sylvia L. Osborn:
The role graph model.
ACM Workshop on Role-Based Access Control 1995 |
4 |  | Matunda Nyanchama,
Sylvia L. Osborn:
Modeling Mandatory Access Control in Role-Based Security Systems.
DBSec 1995: 129-144 |
| 1994 |
3 |  | Matunda Nyanchama,
Sylvia L. Osborn:
Access Rights Administration in Role-Based Security Systems.
DBSec 1994: 37-56 |
| 1993 |
2 |  | Matunda Nyanchama,
Sylvia L. Osborn:
Role-Based Security, Object Oriented Databases & Separation of Duty.
SIGMOD Record 22(4): 45-51 (1993) |
| 1992 |
1 |  | Matunda Nyanchama,
Sylvia L. Osborn:
Database Security Issues in Distributed Object-Oriented Databases.
IWDOM 1992: 92-97 |