共 50 条
- [32] Constrained role-based delegation SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
- [33] Role-based security policy Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
- [34] Role delegation in role-based access control Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
- [36] Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1315 - 1319
- [37] Role-based Runtime Model Synchronization 44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313
- [39] Experiences and perspectives of a role-based IdM Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), 2010, P-166 : 83 - 92
- [40] Role-Based Generic Model Refactoring MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PT II, 2010, 6395 : 78 - 92