共 50 条
- [1] Synchronization Protocols to Prevent Illegal Information Flow in Role-based Access Control Systems [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 279 - 286
- [2] A Synchronization Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the Role-Based Access Control Model [J]. ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 525 - 533
- [3] Preventing Illegal Information Flow Based on Role-Based Access Control Model [J]. NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2008, 5186 : 242 - +
- [6] Read-Write Abortion (RWA) Based Synchronization Protocols to Prevent Illegal Information Flow [J]. 2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 120 - 127
- [7] Role locks to prevent illegal information flow among objects [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, 2004, : 196 - 201
- [8] Role-based Information Flow Control Models [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 1140 - 1147
- [9] Paralocks - Role-Based Information Flow Control and Beyond [J]. ACM SIGPLAN NOTICES, 2010, 45 (01) : 431 - 444
- [10] Paralocks - Role-Based Information Flow Control and Beyond [J]. POPL'10: PROCEEDINGS OF THE 37TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES, 2010, : 431 - 444