共 35 条
- [1] Glossary of computer security terms NCSC-TG-004
- [2] Bell D.E., Lapadula L.J., Secure computer systems: mathematical foundations, (1973)
- [3] Stallings W., Network and Internetwork Security: Principles and Practice, (1995)
- [4] Ferraiolo D.F., Kuhn D.R., Role-based access control, National Computer Security Conference, pp. 554-563, (1992)
- [5] Oh S., Sandhu R., Zhang X., An effective role administration model using organization structure, ACM Transactions on Information and System Security (TISSEC), 9, 2, pp. 113-137, (2006)
- [6] Sandhu R., Bhamidipati V., Munawer Q., The ARBAC97 model for role-based administration of roles, ACM Transactions on Information and System Security, 2, 1, pp. 105-135, (1999)
- [7] Sandhu R., Munawer Q., The ARBAC99 model for administration of roles, Annual Computer Security Applications Conference, pp. 229-238, (1999)
- [8] Sandhu R.S., Coyne E.J., Feinstein H.L., Et al., Role-based access control models, Computer, 2, pp. 38-47, (1996)
- [9] Freudenthal E., Pesin T., Port L., Et al., dRBAC: distributed role-based access control for dynamic coalition environments, International Conference on Distributed Computing System, pp. 411-420, (2002)
- [10] Liu S., Huang H., Role-based access control for distributed cooperation environment, International Conference on Computational Intelligence and Security, pp. 455-459, (2009)