共 50 条
- [1] Cryptographic Role-Based Access Control, Reconsidered PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289
- [2] Static Enforcement of Role-Based Access Control ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
- [3] Universally Composable Cryptographic Role-Based Access Control PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 61 - 80
- [4] Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 5 - 15
- [5] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
- [6] Role-based access control Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
- [7] Quantitative analysis and enforcement of the principle of least privilege in role-based access control SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +
- [8] Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents WEB INFORMATION SYSTEMS AND TECHNOLOGIES, WEBIST 2013, 2014, 189 : 21 - 36
- [10] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569