共 50 条
- [1] Quantitative analysis and enforcement of the principle of least privilege in role-based access control [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +
- [2] Enforcing the principle of least privilege with a state-based privilege control model [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 109 - 120
- [3] Scalable and Efficient Reasoning for Enforcing Role-Based Access Control [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 209 - 224
- [4] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud [J]. COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
- [5] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 257 - +
- [9] Specifying role-based access constraints with object constraint language [J]. ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 2004, 3007 : 687 - 696
- [10] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157