共 50 条
- [1] Integrating Attributes into Role-Based Access Control [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
- [2] A Verifiable Modeling Approach to Configurable Role-Based Access Control [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2010, 6013 : 188 - 202
- [3] A formal model for role-based access control with constraints [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
- [4] A formal model for parameterized role-based access control [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
- [5] Role-Based Access Control Modeling and Validation [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
- [8] A novel approach to role-based access control [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068
- [10] Integrating Role-Based Access Control Model with Web Server [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618