共 50 条
- [31] Distributed access control based on CORBA Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (11):
- [32] Owner-Based Role-Based Access Control OB-RBAC FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
- [34] Trust Level Based Data Storage and Data Access Control in a Distributed Storage Environment 2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 169 - 176
- [35] Mining Attribute-Based Access Control Policies from RBAC Policies 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [36] Management advantages of object classification in role-based access control (RBAC) ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
- [37] I-RBAC: An identity& role based access control model 2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 1176 - +
- [38] Based on Expand RBAC Grid Collaborative Design System Access Control Model ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 217 - 221
- [39] uT-RBAC: Ubiquitous role-based access control model IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
- [40] Platform for access control management in information system based on extended RBAC model 12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 510 - 517