共 50 条
- [1] An access control model for tree data structures [J]. INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 117 - 135
- [2] Specifying role-based access constraints with object constraint language [J]. ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 2004, 3007 : 687 - 696
- [5] Tree-Based Cryptographic Access Control [J]. COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 47 - 64
- [6] Specifying access control policies on data streams [J]. ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 410 - +
- [7] Specifying multimedia access control using RDF [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (03): : 129 - 139
- [8] Specifying and enforcing the principle of least privilege in role-based access control [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1313 - 1331
- [9] Tower: A language for role based access control [J]. POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, 1995 : 88 - 106
- [10] Redaction based RDF Access Control Language [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 177 - 180