共 50 条
- [32] Delegation in role-based access control International Journal of Information Security, 2008, 7 : 123 - 136
- [33] Resource and Role Based Access Control Model PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 548 - 554
- [34] Sorting Out Role Based Access Control PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 63 - 74
- [35] Role-based access control in JavaTM Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
- [36] Role based access control in distributed systems COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 169 - 177
- [37] Attributed Role Based Access Control Model 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 83 - 89
- [38] Semantic Role Based Access Control Model PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 16 (02): : 50 - 64
- [39] Homonymous role in role-based discretionary access control WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
- [40] On the homonymous role in role-based discretionary access control AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +