共 50 条
- [21] Fuzzy Role-Based Access Control [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
- [22] Generalized Role-Based Access Control [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
- [24] Migrating to role-based access control [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [25] Study of Role-based Access Control [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [26] Delegation in role-based access control [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [27] A formal enforcement framework for role-based access control using aspect-oriented programming [J]. MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3713 : 537 - 552
- [28] Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 501 - 515
- [29] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251