共 50 条
- [11] Toward Implementing Spatio-Temporal RBAC Extensions INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 59 - 78
- [12] Implementing Chinese Wall Security Model for Cloud-based Services 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1083 - 1089
- [13] Mining Attribute-Based Access Control Policies from RBAC Policies 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [15] A dynamic reconciliation service of RBAC policies for virtual organizations ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 589 - 595
- [16] Delegation model for CSCW based on RBAC policies and visual modeling Proceedings of the 11th Joint International Computer Conference, 2005, : 126 - 130
- [17] Enforcing RBAC Policies over Data Stored on Untrusted Server ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 10 (02): : 129 - 139
- [18] Implementing Privacy Policies in the Cloud CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 3 - 13