共 21 条
- [1] AMOROSO EG, 1994, FUNDAMENTAL COMPUTER
- [2] Framework for role-based delegation models [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 168 - 176
- [3] Crampton J., 2003, ACM Transactions on Information and Systems Security, V6, P201, DOI 10.1145/762476.762478
- [4] Modelling contexts in the Or-BAC model [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 416 - 425
- [5] CUPPENS F, 2003, WORKSH MET SEC INT F, P754
- [6] CUPPENS F, 2003, P IEEE 4 INT NAT WOR, P120
- [7] FERNANDEZ EB, 1997, P 2 ACM WORKSH ROL B, P121
- [8] Ferraiolo D. E., 1995, Proceedings. 11th Annual Computer Security Applications Conference, P241
- [9] The uses of role hierarchies in access control [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 153 - 160