共 24 条
[1]
[Anonymous], 2001, 6 ACM S ACCESS CONTR
[2]
Bhatti R., 2005, ACM Transactions on Information and Systems Security, V8, P187, DOI 10.1145/1065545.1065547
[4]
Emory Healthcare, 2011, CAN TWITT HELP SAV L
[5]
Ferrini R, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P145, DOI 10.1145/1542207.1542231
[6]
Georgiadis ChristosK., 2001, ACM SACMAT, P21, DOI DOI 10.1145/373256.373259
[7]
Greenberg S., 1991, COMPUTER SUPPORTED C
[9]
Jung Y, 2009, L N INST COMP SCI SO, V10, P304