|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20325 occurrences of 7772 keywords
|
|
|
Results
Found 44187 publication records. Showing 44182 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Luigi Giuri |
Role-based Access Control in Java. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
Java |
34 | Jonathan D. Moffett |
Control Principles and Role Hierarchies. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
|
34 | George Coulouris, Jean Dollimore, Marcus Roberts |
Role and Task-Based Access Control in the PerDiS Groupware Platform. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Ravi S. Sandhu, Venkata Bhamidipati |
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
SQL, ORACLE |
34 | John F. Barkley, Anthony Cincotta |
Managing Role/Permission Relationships Using Object Access Types. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
Microsoft Windows NT |
34 | Ravi S. Sandhu |
Role Activation Hierarchies. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke |
A role-based access control model for protection domain derivation and management. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
Java |
34 | Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri |
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Christian Friberg, Achim Held |
Support for discretionary role based access control in ACL-oriented operating systems. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW), UNIX |
34 | Sylvia L. Osborn |
Mandatory access control and role-based access control revisited. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
34 | D. Richard Kuhn |
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Luigi Giuri, Pietro Iglio |
Role templates for content-based access control. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
SQL |
34 | Roshan K. Thomas |
Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
34 | John F. Barkley |
Comparing simple role based access control models and access control lists. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
Microsoft Windows NT |
34 | Roland Awischus |
Role based access control with the security administration manager (SAM). |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
34 | David F. Ferraiolo, John F. Barkley |
Specifying and managing role-based access control within a corporate intranet. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
34 | Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman |
The ARBAC97 model for role-based administration of roles: preliminary description and outline. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
34 | LouAnna Notargiacomo |
Role-based access control in ORACLE7 and Trusted ORACLE7. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
ORACLE |
34 | Edward J. Coyne |
Role engineering. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Roshan K. Thomas |
Role-based access control and distributed object-based enterprise computing. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | John F. Barkley |
Implementing role-based access control using object technology. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
C++ |
34 | Virgil D. Gligor |
Characteristics of role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Steven A. Demurjian, T. C. Ting, M.-Y. Hu |
Role-based access control for object-oriented/C++ systems. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
C++ |
34 | Jeremy Epstein, Ravi S. Sandhu |
NetWare 4 as an example of role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
NetWare |
34 | Fang Chen, Ravi S. Sandhu |
Constraints for role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | David F. Ferraiolo, D. Richard Kuhn |
Future directions in role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Matunda Nyanchama, Sylvia L. Osborn |
The role graph model. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Luigi Giuri |
Role-based access control: a natural approach. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Trent Jaeger, Atul Prakash 0001 |
Requirements of role-based access control for collaborative systems. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Emil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis |
A policy based role framework for access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Xiaopu Ma, Ruixuan Li 0001, Zhengding Lu |
Role mining based on weights. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
similarity, weight, role engineering, role mining, rbac |
34 | Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan |
Fast exact and heuristic methods for role minimization problems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
role-based access control, role mining |
34 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
34 | Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf |
Role mining - revealing business roles for security administration using data mining technology. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
enterprise systems management, security data models, single point of administration and control, data mining, role-based access control, migration, identity management, security management, provisioning, role engineering, security administration |
34 | Mehdi Dastani, Virginia Dignum, Frank Dignum |
Role-assignment in open agent societies. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
enacting role, organization, role, norm, conflict, goal |
34 | Jason Crampton |
Administrative scope and role hierarchy operations. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
administrative scope, encapsulated range, role hierarchy operation, role-based access control |
34 | Gustaf Neumann, Mark Strembeck |
A scenario-driven role engineering process for functional RBAC roles. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
role-based access control, scenarios, role engineering |
34 | Helena Holmström, Ola Henfridsson |
Customer Role Ambiguity in Community Management. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
Product-centered communities, customer role ambiguity, enhanced customer role, community management |
34 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
34 | James B. D. Joshi, Elisa Bertino |
Fine-grained role-based delegation in presence of the hybrid role hierarchy. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
hybrid hierarchy, access control, delegation, role based |
34 | Jürgen Börstler |
Improving CRC-card role-play with role-play diagrams. |
OOPSLA Companion |
2005 |
DBLP DOI BibTeX RDF |
scenario role-play, introductory programming |
33 | Anil L. Pereira, Vineela Muppavarapu, Soon M. Chung |
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. |
J. Grid Comput. |
2007 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture - Data Access and Integration (OGSA-DAI), Grid databases, Community Authorization Service (CAS), role-based access control (RBAC), virtual organization (VO) |
33 | Jason Crampton |
On permissions, inheritance and role hierarchies. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
role-based access control, inheritance, mandatory access control, permissions |
33 | Jean Bacon, Ken Moody, Walt Yao |
A model of OASIS role-based access control and its support for active security. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS |
33 | Walt Yao, Ken Moody, Jean Bacon |
A model of OASIS role-based access control and its support for active security. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
RBAC, role based access control, policy, service level agreements, certificates, OASIS |
33 | Georgios A. Dafoulas, Linda A. Macaulay |
Facilitating Group Formation and Role Allocation in Software Engineering Groups. |
AICCSA |
2001 |
DBLP DOI BibTeX RDF |
Dynamic Role Allocation, Software Engineering, Knowledge Management, Decision-making, Cultural Differences |
33 | Emil Lupu, Morris Sloman |
A Policy Based Role Object Model. |
EDOC |
1997 |
DBLP DOI BibTeX RDF |
management roles, role class, management policies, consistency, relationships, Distributed systems management |
33 | Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri |
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Egil P. Andersen, Trygve Reenskaug |
System Design by Composing Structures of Interacting Objects. |
ECOOP |
1992 |
DBLP DOI BibTeX RDF |
O-O Design, Interaction-Oriented Design, Role Modeling, Object Composition |
32 | Hassan Takabi, James B. D. Joshi |
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
access control, similarity, role engineering, role mining, rbac |
32 | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani |
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
failed accesses, Access control, role-based access control, role mining, misconfigurations |
32 | Youna Jung, Amirreza Masoumzadeh 0001, James B. D. Joshi, Minkoo Kim |
RiBAC: Role Interaction Based Access Control Model for Community Computing. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
Role interaction, Multiagent system, Role-based Access Control, Cooperation, Community computing |
32 | He Wang 0020, Sylvia L. Osborn |
Discretionary access control with the administrative role graph model. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
role graph model, role-based access control, DAC |
32 | Ninghui Li, Mahesh V. Tripunitara |
Security analysis in role-based access control. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
role-based administration, Role-based access control, trust management, delegation |
32 | Jason Crampton |
Understanding and developing role-based administrative models. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
ARBAC97, RHA, administrative domain, administrative scope, role-based administration, role-based access control |
32 | Axel Kern, Claudia Walhorn |
Rule support for role-based access control. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
SAM Jupiter, automated identity management, directoriescase studies, enterprise role-based access control (ERBAC), provisioning engine, rulesaccess rights, security provisioning, role-based access control (RBAC), rule engine, security administration |
32 | Ninghui Li, Mahesh V. Tripunitara |
Security analysis in role-based access control. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
role-based administration, role-based access control, trust management, delegation |
32 | Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob |
The role-based access control system of a European bank: a case study and discussion. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
control principles, dual control, number of roles, role administration, role-based access control, inheritance, separation of duties, least privilege |
32 | Victoria K. Clawson, Robert P. Bostrom |
The importance of facilitator role behaviors in different face to face group support systems environments. |
HICSS (4) |
1995 |
DBLP DOI BibTeX RDF |
facilitator role behaviors, face-to-face group support systems, facilitation skills, successful business interactions, perceived facilitator training needs, current performance, role dimensions, groupware, training, human factors, group work, meetings |
32 | Catherine Plaisant, Ben Shneiderman |
Organization overviews and role management: inspiration for future desktop environments. |
WETICE |
1995 |
DBLP DOI BibTeX RDF |
organization overviews, role management, future desktop environments, World Bank, semi-automated searches, multiple personal roles, role-centered approach, graphical user interfaces, office automation, management information systems, human resource management, personnel, bank data processing |
31 | Ramaswamy Chandramouli |
Application of XML tools for enterprise-wide RBAC implementation tasks. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
XML |
31 | Ravi S. Sandhu |
Engineering authority and trust in cyberspace: the OM-AM and RBAC way. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Trent Jaeger, Jonathon Tidswell |
Rebuttal to the NIST RBAC model proposal. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick |
A model of accountability, confidentiality and override for healthcare and other applications. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Kang-hak Han, Junghwan Choi, Sanghyun Ryu, Hyun-Su Jang, Young Ik Eom |
Design of RBAC-based secure KAgent framework for home network applications. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
mobile agents, role-based access control, role, home networks |
31 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam |
Migrating to optimal RBAC with minimal perturbation. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
31 | Sylvia L. Osborn |
Information flow analysis of an RBAC system. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
role graphs, role-based access control, mandatory access control |
31 | Yu Zhang |
Modeling Role-Based Agent Team. |
Canadian AI |
2007 |
DBLP DOI BibTeX RDF |
Agent teamwork, Plan, Role |
31 | Laura Vallius, Tomi Kujanpää, Tony Manninen |
Experiencing Narrative Elements Through Social Communication in Computer Based Role-Playing Game - CASE: Castle of Oulu 1651. |
TIDSE |
2006 |
DBLP DOI BibTeX RDF |
narrative elements, computer game, role-play |
31 | Juliana Sutanto, Chee Wei Phang, Huei Huang Kuan, Atreyi Kankanhalli, Bernard C. Y. Tan |
Vicious and Virtuous Cycles in Global Virtual Team Role Coordination. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
role coordination, roles in team work, coordination modes, Global virtual team |
31 | Sejong Oh, Ravi S. Sandhu |
A model for role administration using organization structure. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
role administration, access control, RBAC |
31 | Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu |
A rule-based framework for role based delegation. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
access control, role, delegation, rule-based |
30 | Jiong Qiu, Chen-hua Ma, Jianwei Yin, Jinxiang Dong |
Research and Implementation of Role-Based RBAC Administration Model. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Haibo Shen, Fan Hong |
A Context-Aware Role-Based Access Control Model for Web Services. |
ICEBE |
2005 |
DBLP DOI BibTeX RDF |
Global role, Web Services, Context, Role-Based Access Control |
29 | Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin |
On modeling system-centric information for role engineering. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
attributive permissions, role-based access control, information flow, information model, role engineering |
29 | Luigi Giuri, Pietro Iglio |
A Role-Based Secure Database Design Tool. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
role based secure database design tool, database design methodologies, secure database design methodology, entity relationship conceptual data model, role based security model, analysis algorithm, potential security design mistakes, translation procedure, SQL specification, conceptual model, entity-relationship modelling |
28 | Helmut Jürgensen |
The Arduous Road of Modelling: Excerpts from Records of an Enjoyable Co-operation of Nearly 20 Years. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Andrzej Ehrenfeucht, Ion Petre, Grzegorz Rozenberg |
Reaction Systems: A Model of Computation Inspired by the Functioning of the Living Cell. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Markus Holzer 0001, Martin Kutrib |
Structure and Complexity of Some Subregular Language Families. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Zoltán Ésik, Werner Kuich |
Solving Fixed Point Equations over Complete Semirings. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Timothy Ng 0001, David Rappaport, Kai Salomaa |
Quasi-Distances and Weighted Finite Automata. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Éric Pin |
Open Problems About Regular Languages, 35 Years Later. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Ernst L. Leiss |
Is Complementation Evil? |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Arto Salomaa |
Depth of Closed Classes of Truth Functions in Many-Valued Logic. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Tinus Strauss, Bruce W. Watson, Derrick G. Kourie, Loek Cleophas |
CSP for Parallelising Brzozowski's DFA Construction Algorithm. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Andrew L. Szilard |
Programming Examples of Space-Filling Curves. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Éric Pin |
The Dot-Depth Hierarchy, 45 Years Later. |
The Role of Theory in Computer Science |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Frank Leymann, Wolfgang Reisig, Satish R. Thatte, Wil M. P. van der Aalst (eds.) |
The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006 |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Ekkart Kindler, Björn Axenath, Vladimir A. Rubin |
AMFIBIA: A Meta-Model for the Integration of Business Process Modelling Aspects. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst |
06291 Workshop Report: Process Mining, Monitoring Processes and Services. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst, Maja Pesic |
DecSerFlow: Towards a Truly Declarative Service Flow Language. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst, Michael Beisiegel, Kees M. van Hee, Dieter König, Christian Stahl |
A SOA-Based Architecture Framework. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Uwe Zdun, Schahram Dustdar |
Model-Driven and Pattern-Based Integration of Process-Driven SOA Models. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Oliver Günther 0001, Gerrit Tamm, Frank Leymann |
Pricing Web Services. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Guadalupe Ortiz 0001, Juan Hernández 0001 |
Aspect-Oriented Techniques for Web Services: a Model-Driven Approach. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Dominik Kuropka, Mathias Weske |
Towards a Services-Based Process Platform. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Guadalupe Ortiz 0001, Juan Hernández 0001 |
Towards UML Modelling Extra-Functional Properties in Web Services and their Clients. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Jorge Cardoso 0001 |
Approaches to Compute Workflow Complexity. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Peter Massuthe, Karsten Wolf |
An Algorithm for Matching Nondeterministic Services with Operating Guidelines. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang 0001, Anne Rozinat, H. M. W. Verbeek |
Choreography Conformance Checking: An Approach based on BPEL and Petri Nets. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
Displaying result #101 - #200 of 44182 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|