Secure and Flexible RBAC Scheme Using Mobile Agents
暂无分享,去创建一个
[1] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[2] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.
[3] Manuel Mogollon,et al. Cryptography and Security Services: Mechanisms and Applications , 2007 .
[4] Eric Steegmans,et al. OSDM: An Organizational Supervised Delegation Model for RBAC , 2012, ISC.
[5] Agostino Poggi,et al. JADE: a FIPA2000 compliant agent development environment , 2001, AGENTS '01.
[6] Kapil Gulati,et al. Dimensions and issues of mobile agent technology , 2012, ArXiv.
[7] Mark Strembeck,et al. Modeling process-related RBAC models with extended UML activity models , 2011, Inf. Softw. Technol..
[8] Cátia Santos-Pereira,et al. A Secure RBAC Mobile Agent Model for Healthcare Institutions - Preliminary Study , 2013, ITBAM.
[9] Christopher J. Martinez,et al. Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E , 2013 .
[10] Samar Sen Sarma,et al. ON A KEY EXCHANGE TECHNIQUE, AVOIDING MAN-IN-THE-MIDDLE-ATTACK , 2012 .