共 50 条
- [1] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136
- [3] Delegation in role-based access control [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [4] Combining authentication with role-based access control based on IBS [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1475 - 1480
- [5] Hierarchical role-based access control development [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
- [6] Towards Trustworthy Delegation in Role-Based Access Control Model [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394
- [7] Applying hierarchical and role-based access control to XML documents [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (05): : 325 - 338
- [8] Delegation in a role-based organization [J]. DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
- [9] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
- [10] An Administrative Model for Role-Based Access Control Using Hierarchical Namespace [J]. PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 181 - 188