共 50 条
- [31] Elements of a language for role-based access control [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
- [32] Cryptographic Enforcement of Role-Based Access Control [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
- [33] Role-based access control model for GIS [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
- [34] Garbled role-based access control in the cloud [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
- [35] Resource hierarchies for role-based access control [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
- [36] Hierarchical role-based access control development [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
- [37] Modal logic for role-based access control [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
- [39] λ-RBAC:: Programming with role-based access control [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
- [40] Cryptographic Role-Based Access Control, Reconsidered [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289