共 50 条
- [1] Access control coherence of information systems based on security constraints [J]. COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
- [3] Security constraints in access control of information system using UML language [J]. 15TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2006, : 332 - +
- [4] Resilience to Leaking - Dynamic Systems Modeling of Information Security [J]. PLOS ONE, 2012, 7 (12):
- [5] Towards Dynamic Access Control for Healthcare Information Systems [J]. EHEALTH BEYOND THE HORIZON - GET IT THERE, 2008, 136 : 703 - 708
- [7] Dynamic Security Rules for Legacy Systems [J]. 13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 277 - 284
- [8] Dynamic Output Feedback Control of Networked Systems With Medium Access Constraints [J]. IEEE ACCESS, 2021, 9 : 123075 - 123087
- [9] Information Flow-Based Security Levels Assessment for Access Control Systems [J]. E-TECHNOLOGIES, MCETECH 2015, 2015, 209 : 105 - 121