共 50 条
- [41] Migrating to role-based access control FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [42] Study of Role-based Access Control EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [43] Enterprise model as a basis of administration on role-based access control PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
- [44] Delegation in role-based access control COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [46] A Purpose-Involved Role-Based Access Control Model FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 1119 - 1131
- [48] A privacy enhanced role-based access control model for enterprises NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1012 - 1021
- [50] An Extended Role-Based Access Control Model for Delegating Obligations TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 127 - +