共 50 条
- [12] Inter-domain Role Mapping and Least Privilege SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 157 - 162
- [13] Least privilege and more COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 253 - 258
- [15] The RBAC based privilege management for authorization of wireless networks ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2003, 2762 : 314 - 326
- [16] Mining Stable Roles in RBAC EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 259 - 269
- [17] Analysis of Privilege Escalation Based on Hierarchical RBAC Model 5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
- [18] Design and Implementation of Privilege Management System Based on RBAC EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5078 - 5081
- [19] Enterprise privilege management based on T-RBAC Jisuanji Gongcheng/Computer Engineering, 2004, 30 (19):
- [20] Least Privilege in Separation Kernels E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2008, 9 : 146 - 157