共 50 条
- [41] Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 175 - 183
- [42] A secure, constraint-aware role-based access control interoperation framework [J]. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
- [44] Context-Aware Role-based Access Control in Pervasive Computing Systems [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
- [46] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
- [48] Role-based access control hierarchy model in distributed system [J]. 2003, Huazhong University of Science and Technology (31):
- [49] Location-aware access to hospital information and services [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2004, 8 (04): : 448 - 455
- [50] Role delegation in role-based access control [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44