Access Rights Administration in Role-Based Security Systems
暂无分享,去创建一个
[1] T. C. Ting,et al. Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model , 1991, DBSec.
[2] John E. Dobson,et al. Security Models and Enterprise Models , 1988, Database Security.
[3] Sylvia Osborn,et al. Role-based security: pros, cons, & some research directions , 1993, SGSC.
[4] Udi Manber,et al. Introduction to algorithms - a creative approach , 1989 .
[5] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[6] E. V. Krishnamurthy,et al. On the design and administration of secure database transactions , 1992, SGSC.
[7] Sylvia L. Osborn,et al. Role-based security, object oriented databases and separation of duty , 1993, SGMD.
[8] R.W. Baldwin,et al. Naming and grouping privileges to simplify security management in large databases , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.