共 50 条
- [11] Constructing role-based access control and delegation based on hierarchical IBS [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 112 - +
- [14] A formal model for Role-Based Access Control using graph transformation [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 122 - 139
- [15] A role-based access control model for information mediation [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
- [16] A formal model for parameterized role-based access control [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
- [17] A formal model for role-based access control with constraints [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
- [18] Attributes Enhanced Role-Based Access Control Model [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
- [19] The Research for Spatial Role-Based Access Control Model [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308