共 49 条
[1]
A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
1993, 15 (04)
:706-734
[2]
Abadi M., 1998, Journal of Computer Security, V6, P3
[3]
Abiteboul S., 1995, Foundations of databases, V1st
[4]
[Anonymous], 1997, RBAC 97
[5]
Constrained delegation
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:131-140
[6]
Barker S., 2003, ACM Transactions on Information and Systems Security, V6, P501, DOI 10.1145/950191.950194
[7]
Becker M., 2005, UCAMCLTR648
[8]
Cassandra: Distributed access control policies with tunable expressiveness
[J].
FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS,
2004,
:159-168
[9]
Cassandra: Flexible trust management, applied to electronic health records
[J].
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2004,
:139-154
[10]
BECKER MY, 2006, SECPAL DESIGN SEMANT