共 50 条
- [41] Gran: model checking grsecurity RBAC policies 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 126 - 138
- [42] Design and Implementation of the RBAC-SOA Model ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2945 - +
- [44] Integration of systematic RBAC security model and UML model ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2383 - 2386
- [45] Study on an Improved Extended-RBAC Model WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 640 - +
- [46] Security assurance for an RBAC/MAC security model IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 260 - 267
- [47] The Realization of RBAC Model in Office Automation System 2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 360 - 363
- [48] Toward an improved RBAC model for the organic organization NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2002, : 437 - 442
- [49] The Design and Research of RBAC Model Based on Web 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 640 - 643
- [50] Safety and liveness for an RBAC/MAC security model DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 316 - 329