Delegation of authority using domain-based access rules
暂无分享,去创建一个
[1] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[2] C.-F. Yu. Access control and authorization plan for customer control of network services , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[3] Mahadev Satyanarayanan,et al. Integrating security in a large distributed system , 1989, TOCS.
[4] Stephen T. Vinter,et al. Extended discretionary access controls , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[5] D. C. Robinson. Domains : a uniform approach to distributed system management , 1988 .
[6] Queens Gate,et al. Domains: A New Approach to Distributed System Management , 1988 .
[7] Deborah Estrin. Controls for Interorganization Networks , 1987, IEEE Transactions on Software Engineering.
[8] Roger M. Needham,et al. Authentication revisited , 1987, OPSR.
[9] Deborah Estrin. Non-Discretionary Controls for Inter-Organization Networks , 1985, 1985 IEEE Symposium on Security and Privacy.
[10] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[11] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[12] T. Linden. Operating System Structures to Support Security and Reliable Software , 1976, CSUR.