Research and implementation of user rights management algorithms based on RBAC model forexperimental teaching management system
暂无分享,去创建一个
Tao Lu | Xiaolin Li | Yunyun Wei | Xiuzhu Xu
[1] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[2] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[3] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[4] Tao Xie,et al. Property Verification for Generic Access Control Models , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[5] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[6] Xianmin Wei. Design and Implementation of Rights Management System Based on RBAC Model , 2011, 2011 International Conference on Computer and Management (CAMAN).
[7] Ravi Sandhu,et al. Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment , 1992 .
[8] Ravi S. Sandhu,et al. Rationale for the RBAC96 family of access control models , 1996, RBAC '95.