共 50 条
- [1] The implementation of role-based access control on the web [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
- [2] Modelling and Verification of Dynamic Role-Based Access Control [J]. VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, 2018, 11181 : 48 - 63
- [3] A logical approach to dynamic role-based access control [J]. ARTIFICIAL INTELLIGENCE: METHODOLOGY, SYSTEMS, AND APPLICATIONS, 2008, 5253 : 194 - 208
- [4] DESIGN OF DYNAMIC FINE-GRAINED ROLE-BASED ACCESS CONTROL STRATEGY [J]. 2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 274 - 278
- [5] Role-Based Access Control Implementation Using Prime Numbers [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 234 - +
- [6] Design and Implementation of A Role-Based Access Control for Categorized Resource in Smart Community Systems [J]. 2016 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CCBD), 2016, : 181 - 186
- [7] A new design scheme of role-based access control based on PKI [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 669 - +
- [8] Research and Implementation of Role-based Access Control Model Based on Partition Number [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 6 - 9
- [9] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [10] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184