共 50 条
- [3] Comparison and Evaluation of Information Security Models for Access Control [J]. ENGINEERING SOLUTIONS AND TECHNOLOGIES IN MANUFACTURING, 2014, 657 : 708 - 712
- [4] Turnover on Information Security Professionals: Findings from Korea [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON OPERATIONS AND SUPPLY CHAIN MANAGEMENT (ICOSCM 2010), 2010, 4 : 169 - 174
- [5] Quantum Information-Flow Security: Noninterference and Access Control [J]. 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 130 - 144
- [6] A mandatory access control policy model for information security requirements [J]. PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538
- [7] Security of archival information: the access control in state public files [J]. PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2012, 17 (02): : 158 - 178
- [8] Access control coherence of information systems based on security constraints [J]. COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
- [9] The hybrid model for web services security Access control and information flow control [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +
- [10] Security constraints in access control of information system using UML language [J]. 15TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2006, : 332 - +