共 18 条
[1]
[Anonymous], LECT NOTES COMPUTER
[3]
Ferreira A., 2007, 9 INT C ENT INF SYST
[4]
How to securely break into RBAC: the BTG-RBAC model
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:23-+
[5]
Finin T., 2008, P 13 S ACC CONTR MOD
[6]
Jacobsson A., 2008, THESIS BLEKINGE I TE
[7]
Dynamic access control through Petri net workflows
[J].
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2000,
:159-167
[8]
Leyla N., 2011, THESIS ST FRANCIS XA
[9]
LYMBEROPOULOS L, 2004, P IFIP IEEE NETW OP, P31
[10]
Rabbi F., THESIS ST FRANCIS XA