共 14 条
[2]
Das Devaraj., 2011, Hortonworks, IBM
[3]
The GURAG Administrative Model for User and Group Attribute Assignment
[J].
NETWORK AND SYSTEM SECURITY, (NSS 2016),
2016, 9955
:318-332
[4]
Gupta Maanak, 2017, P ACM SACMAT
[5]
Gupta Maanak, 2017, P IFIP DBSEC
[7]
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
[J].
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI,
2012, 7371
:41-55
[9]
Kulkarni Devdatta., 2013, Proceedings of ACM Conference on Data and application security and privacy, P161, DOI DOI 10.1145/2435349.2435370
[10]
O'Malley Owen., 2009, Hadoop security design