共 50 条
- [31] Active Authorization Rules for Enforcing RBAC with Spatial Characteristics ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 632 - 636
- [32] Safety and Availability Checking for User Authorization Queries in RBAC International Journal of Computational Intelligence Systems, 2012, 5 : 860 - 867
- [33] On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1567 - 1572
- [35] An Efficient Framework for User Authorization Queries in RBAC Systems SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 23 - 31
- [37] Application of Fine-grained Core RBAC Model in Privilege Management of Electric Power ERP ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 263 - 266