共 50 条
- [41] Fuzzy Role-Based Access Control [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
- [42] An Extended Role-Based Access Control Model for CSCW Systems [J]. MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582
- [43] Enterprise model as a basis of administration on role-based access control [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
- [44] Migrating to role-based access control [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [45] Study of Role-based Access Control [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [46] Integrating Role-Based Access Control Model with Web Server [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618
- [47] A Novel Role-based Access Control Model in Cloud Environments [J]. International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
- [48] Role-based Access Control Model in Home Network Environments [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 97 - 99
- [49] Delegation in role-based access control [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [50] An Extended Role-Based Access Control Model for Delegating Obligations [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 127 - +