共 30 条
[1]
Anderson J.P., 1972, Advances in Computers, V12, P1
[3]
Bertino Elisa., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, P10, DOI DOI 10.1145/1966913.1966916
[4]
Blocki J., 2011, P 2 USENIX C HLTH SE, P10
[5]
Brucker AD, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P197, DOI 10.1145/1542207.1542239
[6]
Carminati B., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P988, DOI 10.1109/PASSAT/SocialCom.2011.69
[7]
Christianson B, 2013, ADAPTIVE ACCESS CONT
[9]
How to break access control in a controlled manner
[J].
19TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS,
2006,
:847-+
[10]
How to securely break into RBAC: the BTG-RBAC model
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:23-+