共 50 条
- [1] Integrating Attributes into Role-Based Access Control [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
- [2] Attributes Enhanced Role-Based Access Control Model [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
- [3] Automated and Efficient Analysis of Role-Based Access Control with Attributes [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40
- [4] Role-based access control [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
- [5] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [6] Role-Based Access Control and the Access Control Matrix [J]. 2001, Association for Computing Machinery (35):
- [7] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
- [9] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136
- [10] Practical Role-Based Access Control [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73