共 50 条
- [1] Implementing RBAC policies RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 27 - 36
- [2] Implementing RBAC on the Web Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (03):
- [3] RBAC with ABS Implementation Practicalities for RBAC Integrity Policies 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 500 - 509
- [4] A Chinese Wall approach to privacy policies for the web 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 940 - 944
- [5] Implementing RBAC on a type enforced system 13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 158 - 163
- [6] Gran: model checking grsecurity RBAC policies 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 126 - 138
- [7] Enabling the Deployment of ABAC Policies in RBAC Systems DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 51 - 68
- [9] Chinese Wall Security Policies Information Flows in Business Cloud PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1603 - 1607
- [10] Distributed enforcement of unlinkability policies: Looking beyond the Chinese wall EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 141 - +