Access Control / Verification and Validation / Petri Nets / Formal Specification / Real Time Systems / Active Database / Formal Verification / Access Control Models / Petri Net / Workflow Management System / Authorisation / Real Time Application / Role Based Access Control / Active Database / Formal Verification / Access Control Models / Petri Net / Workflow Management System / Authorisation / Real Time Application / Role Based Access Control
Business / Logic Programming / Public Key Infrastructure / Access Control / Trust Management / Authentication / Key Management / Public key cryptography / Authorisation / Certification / Web Server / Bottom Up / Role Based Access Control / Internet / X / Electronic Commerce / Message Authentication / Authentication / Key Management / Public key cryptography / Authorisation / Certification / Web Server / Bottom Up / Role Based Access Control / Internet / X / Electronic Commerce / Message Authentication