共 50 条
- [41] Integrating Attributes into Role-Based Access Control [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
- [43] A novel approach to role-based access control [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068
- [44] The implementation of role-based access control on the web [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
- [46] A Role-Based Workflow Access Control Model [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
- [47] Spatial context in role-based access control [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 166 - 178
- [48] Role-based access control for a distributed calculus [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (02) : 113 - 155
- [50] Context sensitivity in role-based access control [J]. Operating Systems Review (ACM), 2002, 36 (03): : 53 - 66