共 50 条
- [31] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136
- [32] Practical Role-Based Access Control [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
- [33] Generalized Role-Based Access Control [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
- [35] Fuzzy Role-Based Access Control [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
- [36] Migrating to role-based access control [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [37] Study of Role-based Access Control [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [38] Delegation in role-based access control [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [39] Spatial role-based access control model for wireless networks [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
- [40] An Extended Role-Based Access Control Model for CSCW Systems [J]. MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582