共 50 条
- [32] Role-based access control model for ubiquitous computing environment INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 354 - 363
- [33] Towards Trustworthy Delegation in Role-Based Access Control Model INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394
- [34] A spatio-temporal role-based access control model DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 211 - +
- [36] Applications of the oriented permission role-based access control model 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
- [37] An approach to enforcing Clark-Wilson model in role-based access control model CHINESE JOURNAL OF ELECTRONICS, 2004, 13 (04): : 596 - 599
- [38] Preventing Illegal Information Flow Based on Role-Based Access Control Model NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2008, 5186 : 242 - +
- [39] Research and Implementation of Role-based Access Control Model Based on Partition Number SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 6 - 9
- [40] Role-based Runtime Model Synchronization 44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313