共 50 条
- [3] λ-RBAC:: Programming with role-based access control [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
- [5] Role-based Access Control (RBAC) Authorization in Kubernetes [J]. Journal of ICT Standardization, 2023, 11 (03): : 237 - 260
- [6] NIST model for role-based access control: Towards a unified standard [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 47 - 63
- [7] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
- [9] uT-RBAC: Ubiquitous role-based access control model [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
- [10] I-RBAC: Isolation Enabled Role-Based Access Control [J]. 2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 79 - 86