共 50 条
- [1] User Authorization in a System with a Role-Based Access Control on the Basis of the Analytic Hierarchy Process [J]. 2017 XI INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2017,
- [2] AQUA: An Efficient Solver for the User Authorization Query Problem [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 153 - 154
- [4] An Approach of Query Request Authorization Process for the Access Control System to XML Documents [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 32 - 38
- [5] DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement [J]. SEMANTIC WEB - ISWC 2011, PT II, 2011, 7032 : 293 - 300
- [6] Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 501 - 515
- [7] Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08): : 1762 - 1769
- [8] Specification & Enforcement of Access Control in Information & Communication Systems [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585
- [9] Specification and enforcement of access control in heterogeneous distributed applications [J]. WEB SERVICES -ICWS-EUROPE 2003, PROCEEDINGS, 2003, 2853 : 88 - 100
- [10] Supporting Negative Authorization in Spatiotemporal Role Based Access Control [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 422 - 427