共 50 条
- [21] Access control, reverse access control and replication control in a world wide distributed system [J]. ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 155 - 167
- [23] Supporting relationships in access control using role based access control [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 55 - 65
- [24] Access control in distributed object systems: Problems with access control lists [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 163 - 164
- [25] Computable Access Control: Embedding Access Control Rules Into Euclidean Space [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (10): : 6530 - 6541
- [27] Argumentation for explicit representation of control within enterprise modelling and integration [J]. ENTERPRISE INTER- AND INTRA-ORGANIZATIONAL INTEGRATION: BUILDING INTERNATIONAL CONSENSUS, 2003, 108 : 417 - 424
- [28] On Multiple Access Random Medium Access Control [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1869 - 1873
- [30] Management of access privileges for dynamic access control [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S8899 - S8917