共 50 条
- [31] Quantitative analysis and enforcement of the principle of least privilege in role-based access control SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +
- [32] A role-based interactions model for innovation 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2723 - 2727
- [33] Role-based Workflow Model in SRS 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 388 - 392
- [34] A role-based secure workflow model SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 764 - +
- [35] RESEARCH AND IMPLEMENTATION OF A ROLE-BASED TRUSTWORTHINESS MECHANISM FOR IAAS 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 313 - 317
- [36] A role-based infrastructure for the management of dynamic communities RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 1 - +
- [37] Design and implementation of role-based CIMS security model under B/S environment Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2008, 37 (01): : 109 - 112
- [38] Rights management for role-based access control 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
- [40] Extended role-based sensor management framework 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U175 - U180