共 35 条
- [1] Aich S, 2007, LECT NOTES COMPUT SC, V4804, P1567
- [2] Ammann P. E., 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8), P87, DOI 10.1109/RISP.1991.130777
- [3] Atluri V., 2002, ACM Transactions on Information and Systems Security, V5, P62, DOI 10.1145/504909.504912
- [4] Framework for role-based delegation models [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 168 - 176
- [5] Barka E., 2000, P 23 NATL INF SYST S, V4, P49
- [6] Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
- [7] Bertino E., 1994, 2nd ACM Conference on Computer and Communications Security, P126, DOI 10.1145/191177.191202
- [8] Bradbury J, 1993, P KENTON OLWANDLE C
- [9] Crampton J, 2006, LECT NOTES COMPUT SC, V4189, P174
- [10] FERRAIOLO D, 2001, TISSEC