共 50 条
- [21] On the homonymous role in role-based discretionary access control [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
- [22] Extending a Role Graph for Role-Based Access Control [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
- [23] Rights management for role-based access control [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
- [24] Role-based access control for boxed ambients [J]. THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
- [25] Role-based access control in TOBIAS and NESS [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
- [26] Role-based access control consistency validation [J]. Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
- [27] Cryptographic Enforcement of Role-Based Access Control [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
- [28] Elements of a language for role-based access control [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
- [29] Garbled role-based access control in the cloud [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
- [30] Resource hierarchies for role-based access control [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200