Role Based Security and Java
暂无分享,去创建一个
T. C. Ting | Steven A. Demurjian | M. Cecilia Bastarrica | Debra L. Smarkusky | S. Demurjian | D. Smarkusky | M. Bastarrica
[1] Zahir Tari,et al. Designing Security Agents for the DOK Federated System , 1997, DBSec.
[2] T. C. Ting,et al. Software Architectural Alternatives for User Role-Based Security Policies , 1997, DBSec.
[3] T. C. Ting,et al. Extensible and Reusable Role-Based Object-Oriented Security , 1996, DBSec.
[4] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..
[5] Peter C. Lockemann,et al. System Guided View Integration for Object-Oriented Databases , 1992, IEEE Trans. Knowl. Data Eng..
[6] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[7] T. C. Ting,et al. URBS Enforcement Mechanisms for Object-Oriented Systems , 1995, DBSec.
[8] John F. Barkley,et al. Implementing role-based access control using object technology , 1996, RBAC '95.
[9] C. V. Ramamoorthy,et al. Knowledge and Data Engineering , 1989, IEEE Trans. Knowl. Data Eng..