共 50 条
- [2] A logical approach to dynamic role-based access control [J]. ARTIFICIAL INTELLIGENCE: METHODOLOGY, SYSTEMS, AND APPLICATIONS, 2008, 5253 : 194 - 208
- [3] Early Validation and Verification of a Distributed Role-Based Access Control Model [J]. 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 430 - +
- [4] Security Analysis of Role-Based Access Control through Program Verification [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
- [5] Automated Verification of Role-based Access Control Security Models Recovered from Dynamic Web Applications [J]. 2012 14TH IEEE INTERNATIONAL SYMPOSIUM ON WEB SYSTEMS EVOLUTION (WSE), 2012, : 1 - 10
- [6] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [7] Design and Implementation of Dynamic Menu Based on Role-Based Access Control [J]. MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 2990 - 2994
- [8] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
- [10] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136