共 50 条
- [32] Security Constraints in Temporal Role-Based Access-Controlled Workflows CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 207 - 218
- [33] Security Analysis of Role-Based Access Control through Program Verification 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
- [34] Role-based Access Control for Memory Security on Network-on-Chips 2016 13TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2016, : 1422 - 1424
- [37] Building and operating a software security awareness and role-based training program Merkow, Mark S., 2016, U.S. Department of Defense (29):
- [38] A Search Engine System Based On Role-Based Access Control INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 1128 - 1137
- [39] Enabling role-based delegation and revocation on security-enhanced Linux 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 700 - 705
- [40] A practical conflicting role-based cloud security risk evaluation method Zhan, Jing (zhanjing@bjut.edu.cn), 1600, Bentham Science Publishers (14): : 874 - 886