共 50 条
- [1] Description of Temporal Constraints Using Semantic Web in Role-Based Access Control [J]. KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2006, 140 : 186 - 195
- [2] Modal logic for role-based access control [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
- [4] A formal model for role-based access control with constraints [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
- [5] Role-Based Access Control Modeling and Validation [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
- [6] Policy storage for role-based access control systems [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
- [8] Modeling role-based access control using a relational database tool [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2008, : 7 - 10
- [9] Modeling role-based access control using parameterized UML models [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2004, 2984 : 180 - 193
- [10] Combination of Duty and Historical Constraints in Role-Based Access Control [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 156 - +