共 50 条
- [31] Role-based access control in JavaTM [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
- [32] Generalized Role-Based Access Control [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
- [34] Fuzzy Role-Based Access Control [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
- [35] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
- [36] Study of Role-based Access Control [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [37] Migrating to role-based access control [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [38] Delegation in role-based access control [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [39] Formal Z specifications of several flat Role-Based Access Control models [J]. 30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 282 - +