共 50 条
- [21] An RDF triple based access authorization specification considering subsumption relationships [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1 AND 2, 2008, : 382 - 389
- [22] User Stories and Parameterized Role Based Access Control [J]. MODEL AND DATA ENGINEERING, MEDI 2015, 2015, 9344 : 311 - 319
- [23] Access control enforcement on query-aware encrypted cloud databases [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
- [24] Access Control Metamodel for Policy Specification and Enforcement: From Conception to Formalization [J]. 12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 887 - 892
- [25] Authentication and Authorization: Domain Specific Role Based Access Control Using Ontology [J]. 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2013), 2013, : 439 - 444
- [26] Use case-driven Role Based Access Control security authorization [J]. PROCEEDINGS OF THE 26TH CHINESE CONTROL CONFERENCE, VOL 6, 2007, : 392 - +
- [27] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
- [28] Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 5 - 15
- [29] The resource access authorization route problem in a collaborative manufacturing system [J]. Journal of Intelligent Manufacturing, 2014, 25 : 413 - 425