共 50 条
- [1] The ET-RBAC based Privilege Management Infrastructure for wireless networks E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 84 - 93
- [2] Design and Implementation of Privilege Management System Based on RBAC EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5078 - 5081
- [3] Enterprise privilege management based on T-RBAC Jisuanji Gongcheng/Computer Engineering, 2004, 30 (19):
- [4] THE DESIGN OF THE SECURE TRANSMISSION AND AUTHORIZATION MANAGEMENT SYSTEM BASED ON RBAC PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 103 - 108
- [5] RBAC policies in XML for X.509 based privilege management SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 39 - 53
- [6] Implementation of the Authorization Management with RBAC in the Usage Control Model PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 179 - 182
- [7] Design and Implementation of Authorization System Based on RBAC 2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL I, 2015, : 502 - 504
- [8] Web-based authorization based on X.509 Privilege Management Infrastructure 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 565 - 568
- [10] An OWL-based approach for RBAC with negative authorization KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, 2006, 4092 : 164 - 175