共 50 条
- [22] Health in All Policies: Seizing opportunities, implementing policies INTERNATIONAL JOURNAL OF HEALTH POLICY AND MANAGEMENT, 2014, 2 (02): : 103 - 104
- [23] Conformance Checking of RBAC Policies in Process-Aware Information Systems BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT II, 2012, 100 : 435 - +
- [24] Automated Analysis of RBAC Policies with Temporal Constraints and Static Role Hierarchies 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 2177 - 2184
- [25] A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 454 - 459
- [26] On The Modeling. of Bell-LaPadula Security Policies Using RBAC 17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 257 - 262
- [28] Network security management:: A formal evaluation tool based on RBAC policies NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, III, 2005, 165 : 69 - 80
- [29] POSTER: ESPOONERBAC : Enforcing Security Policies in Outsourced Environments with Encrypted RBAC PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 841 - 843
- [30] RBAC policies in XML for X.509 based privilege management SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 39 - 53