共 60 条
[32]
Herrmann G, 1998, P ANN HICSS, P766, DOI 10.1109/HICSS.1998.649280
[33]
Huang W., 1999, P 12 INT WORK C DAT, P43
[34]
SecureFlow: A secure web-enabled Workflow Management System
[J].
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS,
1999,
:83-94
[35]
Hung P.C., 2003, Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, V21, P33
[36]
Jia Zhang, 2013, 2013 IEEE Ninth World Congress on Services (SERVICES), P29, DOI 10.1109/SERVICES.2013.64
[37]
Jing Jin, 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P200
[39]
Kandala S, 2002, INT FED INFO PROC, V87, P45
[40]
Kang M.H., 2001, P 6 ACM S ACC CONTR, P66, DOI [10.1145/373256.373266, DOI 10.1145/373256.373266]