共 17 条
[1]
Beznosov K., Deng Y., A framework for implementing role-based access control using CORBA security service, Proceedings of the 4th ACM Workshop on Role-Based Access Control, RBAC'99, pp. 19-30, (1999)
[2]
Centonze P., Naumovich G., Fink S.J., Pistoia M., Role-based access control consistency validation, Proceedings of the 2006 International Symposium on Software Testing and Analysis, pp. 121-132, (2006)
[3]
Chang J., Hoh P., Inconsistency detection of authorization policies in distributed component environment, LNCS, 3325, pp. 39-50, (2005)
[4]
Coyne E.J., Role engineering, Proceedings of the 1st ACM Workshop on Role-Based Access Control, pp. 132-140, (1996)
[5]
Essmayr W., Probst S., Weippl E., Role-based access controls: Status, dissemination and prospects for generic security mechanisms, Elect. Commun. Res, 4, pp. 127-156, (2004)
[6]
Fenaiolo D.F., Sandhu R., Gavrila S., Kuhn D.R., Chandramouli R., Proposed NIST standard for role-based access control, ACM Trans. Inform. Syst. Secur, 4, pp. 224-274, (2001)
[7]
Ferraiolo D.F., Chandramouli R., Ahn G., Gavrila S., The role control center: Features and case studies, Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, SACMAT'03, pp. 12-20, (2003)
[8]
Floyd R.W., Algorithm 97: Shortest path, ACM Commun, 5, pp. 345-345, (1962)
[9]
Li N., Tripunitara M.V., Security analysis in rolebased access control, ACM Trans. Inform. Syst. Secur, 9, pp. 391-420, (2006)
[10]
Li N., Mao Z., Administration in role-based access control, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security ASIACCS '07, pp. 127-138, (2007)