共 40 条
[1]
Abadi M.(1993)A calculus for access control in distributed systems ACM Trans. Programm. Lang. Syst. 15 706-734
[2]
Burrows M.(1998)An access control model supporting periodicity constraints and temporal reasoning ACM Trans. Database Syst. 23 231-285
[3]
Lampson B.(2002)An algebra for composing access control policies ACM Trans. Inf. Syst. Secur. 5 1-35
[4]
Plotkin G.(2000)Design and implementation of an access control processor for XML documents Comput. Netw. 33 59-75
[5]
Bertino E.(2002)A fine-grained access control system for XML documents ACM Trans. Inf. Syst. Secur. 5 169-202
[6]
Bettini C.(2001)Controlling access to XML documents IEEE Internet Comput. 5 18-28
[7]
Ferrari E.(1996)Elements of style: analyzing a software design feature with a counterexample detector IEEE. Trans. Softw. Eng. 22 484-495
[8]
Samarati P.(2001)Flexible support for multiple access control policies ACM Trans. Database Syst. 26 214-260
[9]
Bonatti P.(1986)A structure-preserving clause form translation J. Symb. Comput. 2 293-304
[10]
De Capitani di Vimercati S.(1996)Authentication, access control, and audit ACM Comput. Surv. 28 241-243