共 46 条
[1]
AHMED T, 2004, THESIS U MINNESOTA
[2]
AHMED T, 1939, P 8 ACM S ACC CONTR, P196
[3]
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[4]
[Anonymous], LECT NOTES COMPUTER
[5]
[Anonymous], 1997, RBAC 97
[6]
Bacon J., 2002, ACM Transactions on Information and Systems Security, V5, P492, DOI 10.1145/581271.581276
[7]
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[8]
Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
[9]
Bhatti R., 2005, ACM Transactions on Information and Systems Security, V8, P187, DOI 10.1145/1065545.1065547
[10]
Campbell RH, 1974, LECT NOTES COMPUTER, V16