共 18 条
- [1] [Anonymous], LECT NOTES COMPUTER
- [3] Ferreira A., 2007, 9 INT C ENT INF SYST
- [4] How to securely break into RBAC: the BTG-RBAC model [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 23 - +
- [5] Finin T., 2008, P 13 S ACC CONTR MOD
- [6] Jacobsson A., 2008, THESIS BLEKINGE I TE
- [7] Dynamic access control through Petri net workflows [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 159 - 167
- [8] Leyla N., 2011, THESIS ST FRANCIS XA
- [9] LYMBEROPOULOS L, 2004, P IFIP IEEE NETW OP, P31
- [10] Rabbi F., THESIS ST FRANCIS XA