共 50 条
- [42] Fuzzy Role-Based Access Control [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
- [43] Study of Role-based Access Control [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [44] Migrating to role-based access control [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [45] Delegation in role-based access control [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [46] The conflict detection between permission assignment constraints in role-based access control [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 265 - 278
- [47] RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control [J]. ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 141 - 146
- [49] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 257 - +
- [50] A context-aware role-based access control model for Web services [J]. ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 220 - 223