共 50 条
- [31] Hierarchical role-based access control development [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
- [32] Modal logic for role-based access control [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
- [33] Role-based access control model for GIS [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
- [34] Role-based access control for web services [J]. WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558):
- [36] Role-Based Access Control Models for Android [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
- [37] Concurrency and Time in Role-Based Access Control [J]. ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
- [38] Static Enforcement of Role-Based Access Control [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
- [39] Role-Based Access Control Modeling and Validation [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
- [40] Cryptographic Role-Based Access Control, Reconsidered [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289