共 50 条
- [2] Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 103 - 114
- [3] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
- [4] VAC - Verifier of Administrative Role-Based Access Control Policies [J]. COMPUTER AIDED VERIFICATION, CAV 2014, 2014, 8559 : 184 - 191
- [5] Planning User Assignment in Administrative Role-Based Access Control [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 615 - +
- [7] Efficient Policy Analysis for Administrative Role Based Access Control [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 445 - +
- [8] Policy Analysis for Self-administrated Role-Based Access Control [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 432 - 447
- [9] Policy storage for role-based access control systems [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
- [10] An Administrative Model for Role-Based Access Control Using Hierarchical Namespace [J]. PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 181 - 188