共 21 条
[1]
Sandhu R.(1996)Role-based access control models IEEE Comput 29 38-47
[2]
Coyne E. J.(2000)Enforceable security policies ACM Trans Inform Syst Secur 3 30-50
[3]
Feinstein H. L.(1976)Protection in operating systems Commun ACM 19 461-471
[4]
Schneider F. B.(1989)Software verification and validation: an overview IEEE Software 6 10-17
[5]
Harrison M. A.(1986)Automatic verification of finite-state concurrent systems using temporal logic specifications ACM Trans Progr Lang Sys 8 244-295
[6]
Ruzzo W. L.(1997)The model checker SPIN IEEE Trans Software Eng 23 279-136
[7]
Ullman J. D.(1993)Authorizations in distributed systems: a new approach J Comput Secur 2 107-260
[8]
Wallace D. R.(2001)Flexible support for multiple access control policies ACM Trans Database Syst 26 214-649
[9]
Fujii R. U.(1991)The well-founded semantics for general logic programs J ACM 38 619-undefined
[10]
Clarke E. M.(undefined)undefined undefined undefined undefined-undefined