共 50 条
- [1] λ-RBAC:: Programming with role-based access control [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
- [2] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
- [3] uT-RBAC: Ubiquitous role-based access control model [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
- [4] Management advantages of object classification in role-based access control (RBAC) [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
- [5] I-RBAC: Isolation Enabled Role-Based Access Control [J]. 2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 79 - 86
- [6] Owner-Based Role-Based Access Control OB-RBAC [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
- [7] UC-RBAC: A usage constrained role-based access control model [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 337 - 347
- [8] RBAC-SC: Role-Based Access Control Using Smart Contract [J]. IEEE ACCESS, 2018, 6 : 12240 - 12251
- [10] RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 439 - 453