共 13 条
- [1] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
- [2] Anderson A., 2006, SWS 06, P53
- [4] Dougherty DJ, 2007, LECT NOTES COMPUT SC, V4734, P375
- [5] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
- [6] Irwin K., 2006, P 13 ACM C COMPUTER, P134
- [7] LeFevre K., 2004, Proceedings of the Thirtieth International Conference on Very Large Data Bases, P108
- [8] Ni Q, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P41
- [9] Ni Q, 2007, LECT NOTES COMPUT SC, V4734, P72
- [10] Ni Q, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P133