共 50 条
- [1] Trust and role based access control for secure interoperation ("TracSI") [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1458 - 1463
- [4] Consistency maintenance for constraint in role-based access control model [J]. Journal of Zhejiang University-SCIENCE A, 2002, 3 (3): : 292 - 297
- [6] PuRBAC: Purpose-Aware Role-Based Access Control [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS, 2008, 5332 : 1104 - 1121
- [7] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251
- [8] Designing secure e-commerce with role-based access control [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 313 - 319
- [9] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud [J]. COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
- [10] Role-based access control [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200