Role-based systems are autonomic
暂无分享,去创建一个
[1] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[2] Segev Wasserkrug,et al. Autonomic self-optimization according to business objectives , 2004, International Conference on Autonomic Computing, 2004. Proceedings..
[3] Elisa Bertino,et al. TRBAC: a temporal role-based access control model , 2000, RBAC '00.
[4] Kevin A. Kwiat,et al. The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems , 2007, TAAS.
[5] David L. Cohn,et al. Autonomic Computing , 2003, ISADS.
[6] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[7] Roy Sterritt,et al. Engineering ultimate self-protection in autonomic agents for space exploration missions , 2005, 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05).
[8] Haibin Zhu,et al. A visualized tool of role transfer , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.
[9] Salim Hariri,et al. Autonomic Computing: An Overview , 2004, UPP.
[10] Jun Han,et al. Using role-based coordination to achieve software adaptability , 2007, Sci. Comput. Program..
[11] S. Lightstone,et al. Foundations of Autonomic Computing Development , 2007, Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07).
[12] MengChu Zhou,et al. Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[13] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[14] Petr Jan Horn,et al. Autonomic Computing: IBM's Perspective on the State of Information Technology , 2001 .
[15] MengChu Zhou,et al. The Role Transferability in Emergency Management Systems , 2006 .
[16] Haibin Zhu,et al. Fundamental issues in the design of a role engine , 2008, 2008 International Symposium on Collaborative Technologies and Systems.
[17] Jeffrey O. Kephart,et al. Research challenges of autonomic computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[18] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[19] Elisa Bertino,et al. Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[20] Richard Murch,et al. Autonomic Computing , 2004 .
[21] T. Tamai,et al. An adaptive object model with dynamic role binding , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[22] Roy Sterritt,et al. Apoptosis and Self-Destruct: A Contribution to Autonomic Agents? , 2004, FAABS.
[23] J. Mitchison. Cell Biology , 1964, Nature.
[24] Deborah Estrin,et al. Self-configuring localization systems: Design and Experimental Evaluation , 2004, TECS.
[25] MengChu Zhou,et al. Roles in Information Systems: A Survey , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).