共 50 条
- [1] Cryptographic Enforcement of Role-Based Access Control [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
- [2] Universally Composable Cryptographic Role-Based Access Control [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 61 - 80
- [3] Role-based access control [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
- [4] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
- [6] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73
- [7] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [8] Role-Based Access Control and the Access Control Matrix [J]. 2001, Association for Computing Machinery (35):
- [9] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184