共 50 条
- [1] Protecting federated databases using a practical implementation of a formal RBAC policy [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 523 - 527
- [2] Conformance checking of RBAC policy and its implementation [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 144 - 155
- [3] Analyzing RBAC Security Policy of Implementation Using AST [J]. INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2009), 2009, : 215 - 219
- [5] Implementation of Projected Clustering based on SQL queries and UDFs in Relational Databases [J]. 2013 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2013, : 7 - 12
- [6] Databases, tuples, and SQL [J]. Biomedical Instrumentation and Technology, 2008, 42 (05): : 385 - 387
- [8] Design and Implementation of a CIM-SPL Based RBAC Policy Language [J]. MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 126 - 131
- [9] RBAC with ABS Implementation Practicalities for RBAC Integrity Policies [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 500 - 509
- [10] Intrusion detection in RBAC-administered databases [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 155 - 164