共 50 条
- [41] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
- [42] Role-based access control using neural network 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
- [43] Delta Analysis of Role-Based Access Control Models COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
- [44] Extending Role-based Access Control for Business Usage 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 136 - +
- [45] An extended role-based access control for Web services SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 471 - +
- [46] APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 426 - 428
- [48] Enhanced Role-Based Access Control for Cloud Security ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852
- [49] Role-based access control for vehicular adhoc networks 2018 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2018, : 66 - 70
- [50] Putting role-based discretionary access control into practice PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2691 - 2696