共 50 条
- [21] Rights management for role-based access control [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
- [22] Role-based access control in TOBIAS and NESS [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
- [23] Role-based access control for boxed ambients [J]. THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
- [24] Cryptographic Enforcement of Role-Based Access Control [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
- [25] Role-based access control for web services [J]. WSEAS Trans. Inf. Sci. Appl, 2006, 8 (1553-1558):
- [26] Modal logic for role-based access control [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
- [27] Elements of a language for role-based access control [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
- [28] Hierarchical role-based access control development [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
- [29] Resource hierarchies for role-based access control [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
- [30] Role-based access control model for GIS [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754