共 29 条
[1]
Chen CM, 2005, IEEE COMPUT GRAPH, V25, P12, DOI 10.1109/MCG.2005.91
[2]
Chierichetti F, 2010, PROC APPL MATH, V135, P293
[3]
Colantonio A, 2010, P 2010 ACM S APPL CO
[4]
Colantonio A, 2008, PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, P333
[5]
Colantonio A, 2010, IFIP ADV INF COMM TE, V330, P19
[8]
Colantonio A, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P85, DOI 10.1145/1542207.1542223
[9]
Colantonio A, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P2129
[10]
Coyne E.J., 1995, Proc. ACM Workshop on Role-Based Access Control, P15