Instance-level access control for business-to-business electronic commerce
暂无分享,去创建一个
[1] Pietro Iglio,et al. Role templates for content-based access control , 1997, RBAC '97.
[2] R. Brown,et al. The application of security policy to role-based access control and the common data security architecture , 2000, Comput. Commun..
[3] David F. Ferraiolo,et al. Role Based Access Control for the World Wide Web , 1997 .
[4] Benjamin J. Shannon,et al. Java 2 platform enterprise edition specification , 2001 .
[5] W. Gropp,et al. Does increased aromatase activity in adipose fibroblasts cause low sexual desire in patients with HIV lipodystrophy? , 2002, Sexually transmitted infections.
[6] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[7] John F. Barkley,et al. Managing role/permission relationships using object access types , 1998, RBAC '98.
[8] A. Ralph Christ,et al. Java and the IBM San Francisco Project , 1998, IBM Syst. J..
[9] Christoph Bussler,et al. Policy resolution for workflow management systems , 1994, Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences.
[10] SangYeob Na,et al. Role delegation in role-based access control , 2000, RBAC '00.
[11] Edward C. Cheng. An object-oriented organizational model to support dynamic role-based access control in electronic commerce , 2000, Decis. Support Syst..
[12] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.