共 50 条
- [21] Security Analysis of Relationship-Based Access Control Policies [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
- [22] Use of Role Based Access Control for Security-purpose Hypervisors [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1613 - 1619
- [23] A spatio-temporal role-based access control model [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 211 - +
- [27] THE EVALUATION AND COMPARATIVE ANALYSIS OF ROLE BASED ACCESS CONTROL AND ATTRIBUTE BASED ACCESS CONTROL MODEL [J]. 2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 35 - 39