共 50 条
- [31] Resolving least privilege violations in software architectures 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 9 - 16
- [32] Role-based privilege management using attribute certificates and delegation TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 100 - 109
- [35] Secure access privilege delegation using attribute-based encryption International Journal of Information Security, 2023, 22 : 1261 - 1276
- [36] Persona: A High-Performance Bioinformatics Framework 2017 USENIX ANNUAL TECHNICAL CONFERENCE (USENIX ATC '17), 2017, : 153 - 165
- [37] Rule based constrained delegation framework Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (09): : 1511 - 1519
- [39] Determination and Enforcement of Least-Privilege Architecture in Android 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2017), 2017, : 59 - 68
- [40] Automated Detection of Least Privilege Violations in Software Architectures SOFTWARE ARCHITECTURE, 2010, 6285 : 150 - 165