共 50 条
- [2] Composite role-based monitoring (CRBM) for countering insider threats INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 201 - 213
- [4] A role-based modeling for agent teams DIS 2006: IEEE WORKSHOP ON DISTRIBUTED INTELLIGENT SYSTEMS: COLLECTIVE INTELLIGENCE AND ITS APPLICATIONS, PROCEEDINGS, 2006, : 348 - +
- [5] Analyzing Quality Criteria in Role-based Identity and Access Management 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 64 - 72
- [6] Role-Based Access Control Modeling and Validation 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
- [7] A Role-Based Business Process Modeling Methodology CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 4881 - +
- [8] Contextual and Relational Role-Based Modeling Framework 2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 442 - 449
- [9] Study of Role-based Access Control EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212