共 27 条
[1]
Ardagna C., 2007, DIGITAL PRIVACY O, P307
[2]
Augusto AB, 2012, IFIP ADV INF COMM TE, V376, P61
[7]
Ferreira A., 2014, IEEE 3 INT C SER GAM
[8]
How to securely break into RBAC: the BTG-RBAC model
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:23-+
[9]
Ferreira A, 2007, STUD HEALTH TECHNOL, V127, P77
[10]
H. S. T. Committee, 2010, HL7 ROL BAS ACC CONT