共 50 条
- [31] Study on role-based IT strategy implementation mechanism Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 187 - 191
- [32] The implementation of role-based access control on the web 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
- [33] Implementation model of CIMS network design aid tool Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 1999, 5 (06): : 36 - 40
- [34] Role-based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE) ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2008, : 929 - 930
- [35] Design and Implementation of a Context-Based Security Model KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014, 2014, 466 : 356 - 370
- [36] ACCESS RIGHTS ADMINISTRATION IN ROLE-BASED SECURITY SYSTEMS DATABASE SECURITY, VIII: STATUS AND PROSPECTS, 1994, 60 : 37 - 56
- [37] Extended role-based access control model supporting authorization for collaboration environment Proceedings of the International Conference on Mechanical Engineering and Mechanics 2005, Vols 1 and 2, 2005, : 1238 - 1243
- [38] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
- [39] Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 553 - 559
- [40] A Trusted Role-Based Access Control Model for Dynamic Collaboration in a Federated Environment 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 181 - 186