共 9 条
- [1] ANLEY C, 2002, SQL SERVER APPL
- [2] [Anonymous], 2005, INPROCEEDINGS 20 IEE
- [3] Bandhakavi S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P12
- [4] Boyd SW, 2004, LECT NOTES COMPUT SC, V3089, P292
- [5] Buehrer G., 2005, P 5 INT WORKSH SOFTW, P106, DOI DOI 10.1145/1108473.1108496
- [6] Halfond A., 2006, P 14 ACM SIGSOFT INT, P175, DOI DOI 10.1145/1181775.1181797
- [7] Kemalis K, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P2153
- [8] Mallouli W, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P127
- [9] Roichman A, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P31