共 50 条
- [2] Role-based authentication protocol [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 460 - 470
- [4] A Role-Based Coordination Model and its Realization [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (03): : 229 - 244
- [5] An application using role-based access control model [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
- [6] Combining authentication with role-based access control based on IBS [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1475 - 1480
- [7] A Role-Based Model of Linux Privilege Management and its Implementation [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1442 - 1445
- [8] A role-based hierarchical group collaborative awareness model and its implementation [J]. PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 12 - 16
- [9] Role-based Runtime Model Synchronization [J]. 44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313
- [10] Role-Based Generic Model Refactoring [J]. MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PT II, 2010, 6395 : 78 - 92