A Hybrid RBAC-PBAC Access Control Model for Network Isolation System
暂无分享,去创建一个
[1] Chris Vance,et al. Design and implementation of the Trusted BSD MAC framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[2] Ravi Sandhu. Access Control: The Neglected Frontier , 1996, ACISP.
[3] Michael K. Johnson,et al. Linux Application Development (2nd Edition) , 2004 .
[4] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[5] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[6] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[7] Timothy Fraser,et al. Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] Luciano Paschoal Gaspary,et al. Policy-based access control in peer-to-peer grid systems , 2005, The 6th IEEE/ACM International Workshop on Grid Computing, 2005..
[9] Wu Cheng. Policy-based access control in enterprise information system , 2005 .