共 50 条
- [41] Authorization in data management systems 35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 202 - 212
- [42] Resolving information flow conflicts in RBAC systems DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 148 - 162
- [43] RBAC in distributed retrieving systems by attribute certificates IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 800 - 806
- [44] Role engineering with SKAOS for systems employing RBAC 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 56 - 60
- [45] Enforcing Spatial Constraints for Mobile RBAC Systems SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 99 - 108
- [48] Enabling the Deployment of ABAC Policies in RBAC Systems DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 51 - 68
- [49] Authorization and Obligation Policies in Dynamic Systems LOGIC PROGRAMMING, PROCEEDINGS, 2008, 5366 : 22 - +
- [50] An authorization scheme for distributed object systems 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 21 - 30