共 50 条
- [1] Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 5 - 15
- [3] λ-RBAC:: Programming with role-based access control [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
- [4] Cryptographic Enforcement of Role-Based Access Control [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
- [5] Static Enforcement of Role-Based Access Control [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
- [6] Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (26): : 1 - 10
- [7] A distributed calculus for role-based access control [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 48 - 60
- [9] uT-RBAC: Ubiquitous role-based access control model [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
- [10] Management advantages of object classification in role-based access control (RBAC) [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110