共 50 条
- [41] Role-based access control in TOBIAS and NESS [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
- [42] The research on role-based access control mechanism for workflow management system [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 729 - 736
- [43] A Role-Based Access Control System Using Attribute-Based Encryption [J]. 2018 INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2018), 2018, : 128 - 133
- [44] Role-Based Access Control in Multi-Satellite Planning System [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 362 - 364
- [45] Elements of a language for role-based access control [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
- [46] Cryptographic Enforcement of Role-Based Access Control [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
- [47] Role-based access control model for GIS [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
- [48] Garbled role-based access control in the cloud [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
- [49] Resource hierarchies for role-based access control [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
- [50] Hierarchical role-based access control development [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76