共 50 条
- [1] Consistency maintenance for constraint in role-based access control model Journal of Zhejiang University-SCIENCE A, 2002, 3 (3): : 292 - 297
- [2] Role-based access control consistency validation Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
- [3] Role-based access control model for GIS GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
- [4] A Role-Based Workflow Access Control Model PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
- [5] Role-based access control Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
- [6] A role-based access control model for information mediation PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
- [7] Attributes Enhanced Role-Based Access Control Model TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
- [8] The Research for Spatial Role-Based Access Control Model COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
- [9] A formal model for role-based access control with constraints 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
- [10] Role-based access control model for CSCW systems Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937