共 50 条
[32]
A Model for Constraint and Delegation Management
[J].
INFORMATION SECURITY PRACTICE AND EXPERIENCE,
2011, 6672
:362-371
[33]
Secure information sharing using role-based delegation
[J].
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS,
2004,
:810-815
[36]
A role-based delegation model using role hierarchy supporting restricted permission inheritance
[J].
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2,
2003,
:294-299
[39]
Reasoning about delegation and account access in retail payment systems
[J].
COMPUTER NETWORK SECURITY, PROCEEDINGS,
2007, 1
:99-+
[40]
Workflow-based Collaborative Decision Support for Flood Management Systems
[J].
2013 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE,
2013, 18
:2213-2222