共 50 条
- [32] Role-Based Administration of Role-Based Smart Home IoT SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 49 - 58
- [33] Translating role-based access control policy within context POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, 1995 : 107 - 119
- [34] Security Constraints in Temporal Role-Based Access-Controlled Workflows CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 207 - 218
- [35] Security Analysis of Role-Based Access Control through Program Verification 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
- [36] Role-based Access Control for Memory Security on Network-on-Chips 2016 13TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2016, : 1422 - 1424
- [39] Building and operating a software security awareness and role-based training program Merkow, Mark S., 2016, U.S. Department of Defense (29):
- [40] Enabling role-based delegation and revocation on security-enhanced Linux 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 700 - 705