共 31 条
[1]
Ahmed T., 2003, P 8 ACM S ACCESS CON, P196
[2]
Aich S, 2007, LECT NOTES COMPUT SC, V4804, P1567
[3]
Aich S, 2009, LECT NOTES COMPUT SC, V5430, P177, DOI 10.1007/978-3-642-01004-0_10
[4]
Alur R., 1990, Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science (90CH2897-7), P414, DOI 10.1109/LICS.1990.113766
[5]
Alur R., 1990, P 17 INT C AUT LANG, P322
[6]
Behrmann G, 2004, LECT NOTES COMPUT SC, V3185, P200
[7]
Timed automata: Semantics, algorithms and tools
[J].
LECTURES ON CONCURRENCY AND PETRI NETS: ADVANCES IN PETRI NETS,
2004, 3098
:87-124
[8]
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[9]
An access control model supporting periodicity constraints and temporal reasoning
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1998, 23 (03)
:231-285
[10]
Bertino E., 2005, P 10 ACM S ACC CONTR, P29, DOI DOI 10.1145/1063979.1063985