共 50 条
- [31] Extending a Role Graph for Role-Based Access Control IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
- [32] THE PRIVACY-AWARE ACCESS CONTROL SYSTEM USING ATTRIBUTE-AND ROLE-BASED ACCESS CONTROL IN PRIVATE CLOUD 2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 447 - 451
- [33] Purpose-aware interoperability: The ONISTT ontologies and analyzer Fall Simulation Interoperability Workshop 2007, 2007, 2 : 1232 - 1254
- [35] Rights management for role-based access control 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
- [37] Role-based access control consistency validation Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
- [38] Elements of a language for role-based access control INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
- [39] Resource hierarchies for role-based access control 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
- [40] Modal logic for role-based access control COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193