共 50 条
- [21] On formalizing and normalizing role-based access control systems [J]. Computer Journal, 2009, 52 (03): : 305 - 325
- [22] Data structures for constraint enforcement in role-based systems [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 140 - 145
- [24] Role-based planning for systems engineering and project management [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5447 - 5454
- [25] Role-based security for configurable distributed control systems [J]. SIXTH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2001, : 111 - 118
- [27] A new role-based authorization model in a corporate workflow systems [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 701 - 710
- [29] On Automated Role-Based Access Control Assessment in Enterprise Systems [J]. INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 375 - 385
- [30] The application of role-based access control in workflow management systems [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5492 - 5496