共 23 条
[1]
BARAANI A, 1996, SECURITY DATABASES S
[3]
Decentralized trust management
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:164-173
[4]
BLAZE M, 1993, SECURE INTERNET PROG, P185
[5]
The PERMIS X.509 role based privilege management infrastructure
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2003, 19 (02)
:277-289
[6]
Damiani E., 2002, ACM Transactions on Information and Systems Security, V5, P169, DOI 10.1145/505586.505590
[7]
A logical language for expressing authorizations
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:31-42
[8]
Kudo M., 2000, P 7 ACM C COMPUTER C, P87
[10]
MANA A, 2003, P IASTED INT C COMM, P283