共 11 条
[1]
Sandhu R., Coyne E., Feinstein H., Younman C., Role-Based Access Control Models, IEEE Computer, 29, 2, pp. 38-47, (1996)
[2]
Crampton J., Khambhammettu H., Delegation in Role Base Access Control, International Journal of Information Security, 7, 2, pp. 123-136, (2008)
[3]
Barka E.S., Framework for Role-Based Delegation Models, (2002)
[4]
Zhang L., Ahn G.-J., Chu B.-T., A rule-based framework for role-based delegation, ACM Transactions on Information and System Security (TISSEC), 6, 3, pp. 404-441, (2003)
[5]
Zhang X., Sejong O., Sandhu R., PBDM: A Flexible Delegation Model in RBAC, Proc. of the SACMAT'03, Como, pp. 149-157, (2003)
[6]
Qing-Song Z., Yu-Fang S., Bo S., RPRDM: A Repeated-and-Part-Role-Based Delegation Model, Journal of Computer Research and Development, 40, 2, pp. 221-227, (2003)
[7]
Chun-Xiao Y., Wu Z.-F., Et al., An Attribute-Based Extended Delegation Model, Journal of Computer Research and Development, 43, 6, pp. 1050-1057, (2006)
[8]
Brewer D.D.C., Nash M.J., The chinese wall security policy, Proc. of the IEEE Symposium on Security and Privacy, pp. 215-228, (1989)
[9]
Lin T.Y., Chinese wall security policy-an aggressive model, Proc. of the Computer Security Applications Conference, pp. 282-289, (1989)
[10]
Simon R., Zurko M., Separation of duty in role-based environments, Proc. of 10th IEEE Computer Security Foundations Workshop, pp. 183-194, (1997)