共 50 条
- [21] Role-based access control hierarchy model in distributed system [J]. 2003, Huazhong University of Science and Technology (31):
- [22] Role-based access control for CORBA distributed object systems [J]. PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60
- [23] Role-Based Access Control (RBAC) in Java via proxy objects using annotations [J]. Proc. ACM Symp. Access Control Models Technol. SACMAT, (79-88):
- [25] RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 439 - 453
- [26] Automated and Efficient Analysis of Role-Based Access Control with Attributes [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40
- [27] An application of directory service markup language (DSML) for role-based access control (RBAC) [J]. 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 934 - 939
- [28] Scalable and Efficient Reasoning for Enforcing Role-Based Access Control [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 209 - 224
- [29] Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents [J]. WEB INFORMATION SYSTEMS AND TECHNOLOGIES, WEBIST 2013, 2014, 189 : 21 - 36
- [30] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184