共 50 条
- [31] A framework for implementing role-based access control using CORBA security service [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 19 - 30
- [32] Reasoning about security: A logic and a decision method for role-based access control [J]. QUALITATIVE AND QUANTITATIVE PRACTICAL REASONING, 1997, 1244 : 421 - 435
- [33] Research on Security Status Recovery in Temporal Role-Based Access Control System [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 27 - 29
- [34] Security enhancement of a flexible payment scheme and its role-based access control [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 457 - +
- [35] Automated and Efficient Analysis of Role-Based Access Control with Attributes [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40
- [37] ACCESS RIGHTS ADMINISTRATION IN ROLE-BASED SECURITY SYSTEMS [J]. DATABASE SECURITY, VIII: STATUS AND PROSPECTS, 1994, 60 : 37 - 56
- [38] A role-based access control policy verification framework for real-time systems [J]. WORDS 2005: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable, Proceedings, 2005, : 13 - 20