共 50 条
- [21] Formal Z specifications of several flat Role-Based Access Control models [J]. 30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 282 - +
- [22] On the formal analysis of a spatio-temporal role-based access control model [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 17 - 32
- [23] A Light-Weight Approach for Verifying Multi-Threaded Programs with CPAchecker [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (233): : 61 - 71
- [24] Access Control in XML Repositories Using a Role-Based Approach [J]. JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 1041 - 1056
- [25] Role-based access control in DCOM [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
- [27] Delegation in role-based access control [J]. International Journal of Information Security, 2008, 7 : 123 - 136
- [28] Practical Role-Based Access Control [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
- [29] Role delegation in role-based access control [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
- [30] Role-based access control in JavaTM [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100