共 11 条
[1]
[Anonymous], 2000, UNIFIED MODELING LAN, DOI DOI 10.1007/3-540-40011-7_10
[2]
Barkley J., 1995, P 1 ACM WORKSH ROL B, P93
[3]
CHANDRAMOULI R, 1999, 4 ACM WORKSH ROL BAS
[4]
Coyne E. J., 1995, P 1 ACM WORKSH ROL B, P15
[5]
Towards a UML based approach to role engineering
[J].
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS,
1999,
:135-143
[6]
SecureFlow: A secure web-enabled Workflow Management System
[J].
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS,
1999,
:83-94
[7]
ROECKLE H, 2000, P 5 ACM WORKSH ROL B, P103
[9]
SANDHU RS, 1998, ADV COMPUTERS, V46
[10]
Napoleon network application policy environment
[J].
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS,
1999,
:145-152