Research on Temporal Extended Role Hierarchy
暂无分享,去创建一个
Hanjiang Lai | Yong Tang | Yong Tang | Wei Dao | Jianguo Li | Hanjiang Lai | Yong Tang | Jianguo Li | Wei Dao
[1] Jason Crampton,et al. On permissions, inheritance and role hierarchies , 2003, CCS '03.
[2] Patrick D. McDaniel,et al. On context in authorization policy , 2003, SACMAT '03.
[3] Chokri Ben Amar,et al. An authorization and access control model for workflow , 2004, First International Symposium on Control, Communications and Signal Processing, 2004..
[4] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[5] Ravi S. Sandhu,et al. Induced role hierarchies with attribute-based RBAC , 2003, SACMAT '03.
[6] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[7] James B. D. Joshi,et al. Towards administration of a hybrid role hierarchy , 2005, IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005..