共 50 条
- [41] Trust and Risk based Access Control and Access Control Constraints KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
- [42] A Tool for Access Control Policy Validation JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01): : 157 - 166
- [44] B-ERAC : BLOCKCHAIN-ENABLED ROLE-BASED ACCESS CONTROL FOR SECURE IOT DEVICE COMMUNICATION SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5649 - 5671
- [45] A ROLE BASED ACCESS CONTROL SOLUTION FOR LINUX NETWORK UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2014, 76 (01): : 89 - 104
- [46] A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 18, 2006, 18 : 58 - 63
- [47] Securing User Access at IoT Middleware Using Attribute Based Access Control 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
- [48] Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services SYMMETRY-BASEL, 2021, 13 (03):
- [49] Efficient Policy Analysis for Administrative Role Based Access Control CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 445 - +