共 18 条
[1]
[Anonymous], IEEE COMPUT
[2]
Migrating to role-based access control
[J].
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS,
1999,
:71-81
[3]
Coyne E., 1996, Proceedings of the first ACM Workshop on Role-based access control, P4, DOI 10.1145/270152.270159
[4]
Engineering of role/permission assignments
[J].
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2001,
:127-136
[5]
FERNANDEZ EB, 1997, P 2 ACM WORKSH ROL B, P121
[6]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[7]
GALLAGHER MP, 2002, ECONOMIC IMPACT ROLE
[8]
*GRAPHV, 2008, GRAPH VIS SOFTW
[9]
KERN A, 2002, P 7 ACM S ACC CONTR, P43, DOI DOI 10.1145/507711.507718
[10]
Kuhlmann Martin., 2003, Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, SACMAT '03, P179