Realizing MAC in role-based security system

被引:0
|
作者
Li, L.X.
Cao, J.K.
Chen, W.M.
Huang, S.L.
机构
来源
| 2001年 / Shenyang Institute of Computing Technology卷 / 22期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Role-Based Multiple Controllers for Load Balancing and Security in SDN
    Chourishi, Dharmendra
    Miri, Ali
    Milic, Mihailo
    Ismaeel, Salam
    2015 IEEE CANADA INTERNATIONAL HUMANITARIAN TECHNOLOGY CONFERENCE (IHTC2015), 2015,
  • [22] A Role-Based PMI Security Model for E-Government
    WU Li-jun
    Wuhan University Journal of Natural Sciences, 2005, (01) : 329 - 332
  • [23] A role-based process security model in business process management
    Kim, Kwanghoon
    Kim, Changmain
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1596 - 1599
  • [24] An analysis of graphs that represent a role-based security policy hierarchy
    Belim, Sergey
    Bogachenko, Nadezda
    Ilushechkin, Evgeniy
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (05) : 641 - 657
  • [25] Extensible and reusable role-based object-oriented security
    Demurjian, SA
    Ting, TC
    Price, M
    Hu, MY
    DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 288 - 307
  • [26] Role-based PMI security model for E-government
    Wu, Li-Jun
    Su, Kai-Le
    Yang, Zhi-Hua
    Wuhan University Journal of Natural Sciences, 2005, 10 (01) : 329 - 332
  • [27] Role-Based Administration of Role-Based Smart Home IoT
    Shakarami, Mehrnoosh
    Sandhu, Ravi
    SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 49 - 58
  • [28] A system for visual role-based policy modelling
    Giordano, Massimiliano
    Polese, Giuseppe
    Scanniello, Giuseppe
    Tortora, Genoveffa
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2010, 21 (01): : 41 - 64
  • [29] A role-based customer review mining system
    Wenqian Shang
    Youli Qu
    Houkuan Huang
    Yongmin Lin
    Hongbin Dong
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 4855 - +
  • [30] Securing role-based distributed collaboration system
    Hu, HL
    Chen, D
    Huang, CQ
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5520 - 5524