共 50 条
- [1] The RBAC-based user authorization in Sanxin ERP system [J]. PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 155 - 158
- [4] An RBAC-based policy information base [J]. SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 171 - 180
- [5] On Role Mappings for RBAC-based Secure Interoperation [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
- [6] FWAM: A flexible workflow authorization model using extended RBAC [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 625 - +
- [7] Modeling of RBAC-based access control of virtual enterprise [J]. KYBERNETES, 2008, 37 (9-10) : 1242 - 1249
- [8] A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies [J]. 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 454 - 459
- [9] RBAC-Based Access Control Integration Framework for Legacy System [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 194 - +
- [10] RBAC-Based UAV Control System for Multiple Operator Environments [J]. COMPUTER APPLICATIONS FOR SOFTWARE ENGINEERING, DISASTER RECOVERY, AND BUSINESS CONTINUITY, 2012, 340 : 210 - +