共 50 条
- [1] Modeling of the role-based access control policy with constraints using description logic [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 500 - 511
- [2] Role-based access control on the web using LDAP [J]. DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
- [3] Role-based access control on the web using Java']Java™ [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 11 - 18
- [5] The implementation of role-based access control on the web [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
- [6] A formal model for role-based access control with constraints [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
- [7] Role-based access control system for web services [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 357 - 362
- [8] An extended role-based access control for Web services [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 471 - +
- [9] Application of Role-Based Access Control for Web Environment [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
- [10] Securing the Web of Things with Role-Based Access Control [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 14 - 26