共 50 条
- [1] A formal model for role-based access control with constraints [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
- [2] A Survey of Role Mining Methods in Role-Based Access Control System [J]. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 291 - 300
- [3] Combination of Duty and Historical Constraints in Role-Based Access Control [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 156 - +
- [4] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [5] MUTUAL EXCLUSION ROLE CONSTRAINT MINING BASED ON WEIGHT IN ROLE-BASED ACCESS CONTROL SYSTEM [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (01): : 91 - 101
- [6] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
- [8] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136
- [10] Generalized Role-Based Access Control [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398