共 50 条
- [21] Study of Role-based Access Control EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
- [22] Delegation in role-based access control COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
- [23] RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 141 - 146
- [24] Role-based access control on the web using Java']Java™ FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 11 - 18
- [25] Role-based Access Control Using Ontology in Cloud Storage INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 1 - 12
- [26] Access Control in XML Repositories Using a Role-Based Approach JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 1041 - 1056
- [27] Using attribute certificate to design role-based access control PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 216 - 218
- [28] The Implementation of Rights Management of Network Teaching Platform with Role-Based Access Control ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1603 - +
- [29] An attributable role-based access control for healthcare COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
- [30] Homonymous role in role-based discretionary access control WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300