An approach to role-based access control for digital content
暂无分享,去创建一个
[1] Cynthia E. Irvine,et al. Toward a taxonomy and costing method for security services , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[2] Catherine A. Meadows. An outline of a taxonomy of computer security research and development , 1993, NSPW '92-93.
[3] Tim Wilkinson,et al. Trustworthy access control with untrustworthy Web servers , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[4] Jeffrey B. Lotspiech,et al. Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality , 1997, D Lib Mag..
[5] Henry M. Gladney,et al. Safeguarding Digital Library Contents and Users: Document Access Control , 1997, D Lib Mag..
[6] Amir Herzberg,et al. Safeguarding Digital Library Contents: Charging for Online Content , 1998, D Lib Mag..
[7] Jeffrey B. Lotspiech,et al. Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels , 1997, D Lib Mag..
[8] Hans Lohninger,et al. Teach/Me - Data Analysis , 1999 .
[9] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.