共 50 条
- [1] Extending a Role Graph for Role-Based Access Control [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
- [2] On the interaction between role-based access control and relational databases [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 275 - 287
- [3] Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 3 - 19
- [4] A formal model for Role-Based Access Control using graph transformation [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 122 - 139
- [5] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [6] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
- [8] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136