共 50 条
- [2] Role-based access control model for ubiquitous computing environment [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 354 - 363
- [3] Extending Role-based Access Control for Business Usage [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 136 - +
- [4] uT-RBAC: Ubiquitous role-based access control model [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
- [5] Access Control for e-Business on MOPASS [J]. IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2005, 1 (01): : 65 - 72
- [6] Application of Role-Based Access Control for Web Environment [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
- [7] Role-based access control [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
- [8] Role-Based Access Control Models in E-Government [J]. FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 499 - 506
- [9] Role-based access control and the access control matrix [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
- [10] Role-Based Access Control and the Access Control Matrix [J]. 2001, Association for Computing Machinery (35):