共 50 条
- [41] A practical conflicting role-based cloud security risk evaluation method Zhan, Jing (zhanjing@bjut.edu.cn), 1600, Bentham Science Publishers (14): : 874 - 886
- [42] Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1225 - +
- [43] Verification of dynamic Separation of Duty policy for role-based business processes 2008 IEEE REGION 5 CONFERENCE, 2008, : 206 - 211
- [44] Role-based policy to maintain privacy of patient health records in cloud The Journal of Supercomputing, 2019, 75 : 5866 - 5881
- [45] Analysis of role-based trust management policy using description logics Tang, S. (csshtang@scut.edu.cn), 2012, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (08):
- [46] Role-based policy to maintain privacy of patient health records in cloud JOURNAL OF SUPERCOMPUTING, 2019, 75 (09): : 5866 - 5881
- [47] Configuring role-based access control to enforce Chinese Wall policy COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 206 - 209
- [48] Policy Analysis for Self-administrated Role-Based Access Control TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 432 - 447
- [49] Reasoning about security: A logic and a decision method for role-based access control QUALITATIVE AND QUANTITATIVE PRACTICAL REASONING, 1997, 1244 : 421 - 435
- [50] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558