共 50 条
- [1] Future directions in role-based access control models [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 22 - 26
- [2] Delta Analysis of Role-Based Access Control Models [J]. COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
- [3] Role-based access control [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
- [4] An Improved Role-based Access to Android Applications with JCHR [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 341 - 348
- [5] Role-Based Access Control Models in E-Government [J]. FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 499 - 506
- [6] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [7] Role-Based Access Control and the Access Control Matrix [J]. 2001, Association for Computing Machinery (35):
- [8] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
- [10] Practical Role-Based Access Control [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73