共 16 条
- [1] Aho A. V., 1972, SIAM Journal on Computing, V1, P131, DOI 10.1137/0201008
- [2] [Anonymous], 1999, ACM T INFORM SYST SE
- [4] Merging security policies: analysis of a practical example [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 123 - 136
- [5] Damiani E., 2002, ACM Transactions on Information and Systems Security, V5, P169, DOI 10.1145/505586.505590
- [6] Ferriaolo David, 1992, P 15 NATL COMP SEC C, P554
- [8] SCALE AND PERFORMANCE IN A DISTRIBUTED FILE SYSTEM [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1988, 6 (01): : 51 - 81
- [9] Flexible support for multiple access control policies [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2001, 26 (02): : 214 - 260
- [10] JOSHI JBD, 2003, P 8 ACM S ACC CONTR, P51, DOI DOI 10.1145/775412.775420