Role-based authorization in decentralized health care environments
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Rationale for the RBAC96 family of access control models , 1996, RBAC '95.
[2] Li Gong,et al. Secure software architectures , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[3] Paul Ammann,et al. Data Diversity: An Approach to Software Fault Tolerance , 1988, IEEE Trans. Computers.
[4] E. B. Steen,et al. The Computer-Based Patient Record: An Essential Technology for Health Care , 1992, Annals of Internal Medicine.
[5] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[6] Pierangela Samarati,et al. Authentication, Access Controls, and Intrusion Detection , 1997, The Computer Science and Engineering Handbook.
[7] Emil C. Lupu,et al. Role-based security for distributed object systems , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.
[8] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[9] Richard Grimes,et al. Professional Dcom Programming , 1997 .
[10] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[11] Dale Rogerson,et al. Inside COM , 1997 .
[12] Brian Randell. System structure for software fault tolerance , 1975 .
[13] Gail-Joon Ahn. Role-based access control in DCOM , 2000, J. Syst. Archit..
[14] Charles Adams,et al. Understanding Public-Key Infra-structure: Concepts, Standards, and Deployment Con-siderations , 1999 .