Roles in learning systems
暂无分享,去创建一个
[1] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[2] Gail-Joon Ahn,et al. Authorization management for role-based collaboration , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[3] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[4] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[5] Song Zhi-gang. Role Based Access Control in MIS , 2002 .
[6] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[7] MengChu Zhou,et al. Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[8] Gu Jian. RBAC Based Privilege Management Infrastructure , 2004 .
[9] Haibin Zhu,et al. Role mechanisms in collaborative systems , 2006 .
[10] George Loizou,et al. Administrative scope: A foundation for role-based administrative models , 2003, TSEC.
[11] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[12] D. Richard Kuhn,et al. Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .