共 50 条
- [23] Migrating to role-based access control FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [24] Study of Role-based Access Control EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [25] Delegation in role-based access control COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [26] Reasoning about security: A logic and a decision method for role-based access control QUALITATIVE AND QUANTITATIVE PRACTICAL REASONING, 1997, 1244 : 421 - 435
- [27] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558
- [28] A framework for implementing role-based access control using CORBA security service FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 19 - 30
- [29] Research on Security Status Recovery in Temporal Role-Based Access Control System 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 27 - 29
- [30] Automated and Efficient Analysis of Role-Based Access Control with Attributes DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40