共 50 条
- [13] Role-based access control in JavaTM Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
- [14] Migrating to role-based access control FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
- [15] Study of Role-based Access Control EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [16] Delegation in role-based access control COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [17] Role-based access control on the web using LDAP DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
- [18] Using NFS to implement role-based access control SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 299 - 304
- [19] Role-based access control using neural network 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
- [20] An application using role-based access control model PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375