共 50 条
- [1] Type based discretionary access control [J]. CONCUR 2004 - CONCURRENCY THEORY, PROCEEDINGS, 2004, 3170 : 225 - 239
- [2] A generic discretionary access control system for reuse frameworks [J]. TWENTY-SECOND ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE - PROCEEDINGS, 1998, : 356 - 361
- [3] On safety in discretionary access control [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 96 - 109
- [4] The complexity of discretionary access control [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 405 - 420
- [5] Trojan Horse Resistant Discretionary Access Control [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 237 - 246
- [6] Towards a mechanism for discretionary overriding of access control [J]. SECURITY PROTOCOLS, 2006, 3957 : 312 - 323
- [7] Discretionary overriding of access control in the privilege calculus [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 219 - 232
- [8] A Discretionary Delegation Framework for Access Control Systems [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 : 865 - 882
- [9] DISCRETIONARY ACCESS-CONTROL BY MEANS OF USAGE CONDITIONS [J]. COMPUTERS & SECURITY, 1994, 13 (05) : 437 - 450
- [10] Discretionary Access Control with the Administrative Role Graph Model [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 151 - 156