共 24 条
[1]
AHN GJ, 2000, ACM T INFORMATION SY, V3
[2]
[Anonymous], 2000, UNIFIED MODELING LAN, DOI DOI 10.1007/3-540-40011-7_10
[3]
Chen F., 1995, P 1 ACM WORKSH ROL B, P39
[4]
Towards a UML based approach to role engineering
[J].
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS,
1999,
:135-143
[5]
FERRAIOLO D, 2001, ACM T INFORMATION SY, V4
[6]
Ferriaolo David, 1992, P 15 NATL COMP SEC C, P554
[7]
A formal model for role-based access control with constraints
[J].
9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
1996,
:136-145
[8]
HU MY, 1995, DATABASE SECURITY, V8
[9]
Jaeger T., 1999, Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99), P135, DOI 10.1109/ENABL.1999.806940
[10]
JAEGER T, 2002, IN PRESS ACM T INFOR, V4