共 17 条
[1]
Ni Q., Bertino E., Lobo J., Et al., Privacy-aware role-based access control, ACM Transactions on Information and System Security (TISSEC), 13, 3, (2010)
[2]
Sandhu R.S., Coyne E.J., Feinstein H.L., Et al., Role-based access control models, Computer, 29, 2, pp. 38-47, (1996)
[3]
Sandhu R., Ferraiolo D., Kuhn R., The NIST model for role-based access control: towards a unified standard, ACM Workshop on Role-based Access Control, (2000)
[4]
Xiao M., Chen L., Integrity Auditing Strategy Design for Data Storage Security in Cloud Computing, Journal of Computational Information Systems, Binary Information Press, 8, 23, pp. 9779-9789, (2012)
[5]
Laurie B., Access Control (v0.1), (2009)
[6]
Strembeck M., Mendling J., Modeling process-related RBAC models with extended UML activity models, Information and Software Technology, 53, 5, pp. 456-483, (2011)
[7]
Ferraiolo D., Kuhn R., Role-based access control, Proceedings of the NISTCNSA National (USA) Computer Security Conference, pp. 554-563, (1992)
[8]
Yuan E., Tong J., Attributed based access control (ABAC) for web services, Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference on, (2005)
[9]
Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 89-98, (2006)
[10]
Danwei C., Xiuli H., Xunyi R., Access control of cloud service based on ucon, Cloud Computing, pp. 559-564, (2009)