共 50 条
- [2] A Secure e-Governance Model Using Role-Based Delegation [J]. THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 911 - 919
- [3] Delegation in a role-based organization [J]. DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
- [4] Secure Spectrum Sensing in Cognitive-Radio-Based Smart Grid Using Role-Based Delegation [J]. PROCEEDINGS OF THE 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING (ICIME 2016), 2016, : 25 - 29
- [5] Constrained role-based delegation [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
- [6] Role delegation in role-based access control [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
- [7] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136
- [8] Delegation in role-based access control [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [9] Framework for role-based delegation models [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 168 - 176
- [10] Role-based delegation with negative authorization [J]. FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 307 - 318