共 50 条
- [41] Study of Role-based Access Control EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [42] Migrating to role-based access control FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [43] A Purpose-Involved Role-Based Access Control Model FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 1119 - 1131
- [44] Detecting and Resolving Misconfigurations in Role-Based Access Control INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 318 - 325
- [46] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
- [47] Consistency maintenance for constraint in role-based access control model Journal of Zhejiang University-SCIENCE A, 2002, 3 (3): : 292 - 297
- [49] Severity Level of Permissions in Role-Based Access Control 2018 12TH INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE ON DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2018,
- [50] Universally Composable Cryptographic Role-Based Access Control PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 61 - 80