Access control models in heterogeneous information systems: From conception to exploitation
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Danielle Boulanger,et al. A Role-Based Model for Access Control in Database Federations , 2001, ICICS.
[3] Aneta Poniszewska-Maranda,et al. Security Constraints in Access Control of Information System Using UML Language , 2006, 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06).
[4] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[5] Aneta Poniszewska-Maranda,et al. Access Control Coherence of Information Systems Based on Security Constraints , 2006, SAFECOMP.
[6] Elena Ferrari,et al. Database Security , 2009, Encyclopedia of Database Systems.
[7] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[8] Elisa Bertino,et al. Role Based Access Control Models , 2001, Inf. Secur. Tech. Rep..
[9] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[10] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[11] Aneta Poniszewska-Maranda,et al. Representation of Extended RBAC Model Using UML Language , 2005, SOFSEM.
[12] 강문설. [서평]「The Unified Modeling Language User Guide」 , 1999 .
[13] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..