共 18 条
[1]
Berners-Lee T., Fielding R., Masinter L., Uniform resource identifiers (URI): Generic syntax, RFC, 2396, (1998)
[2]
Beznosov K., Deng Y., Blakley B., Burt C., Barkley J., A resource access decision service for CORBA-based distributed systems, 15th Annual Computer Security Applications Conference (ACSAC'99), pp. 310-319, (1999)
[3]
Blaze M., Feigenbaum J., Keromytis A., KeyNote: Trust management for public-key infrastructures, Security Protocols - 6th International Workshop, 1550, pp. 59-66, (1999)
[4]
Blount S., Securing your insecurities on the web, 15th Annual Computer Security Applications Conference (ACSAC'99), (1999)
[5]
Ferraiolo D.F., Barkley J.F., Kuhn D.R., A role-based access control model and reference implementation within a coprorate intranet, ACM Trans. Inf. Syst. Sec., 2, 1, pp. 34-64, (1999)
[6]
Foley S., Implementing Chinese walls in Unix, Comput. Sec. J., 16, 6, pp. 551-563, (1997)
[7]
Jajodia S., Kudo M., Subrahmaman V.S., Provisional authorization, E-commerce Security and Privacy, pp. 133-159, (2001)
[8]
Workshop on Security and Privacy in E-commerce (WSPEC), (2000)
[9]
Jajodia S., Samarati P., Subrahmanian V., A logical language for expressing authorizations, IEEE Symposium on Research in Security and Privacy, pp. 31-42, (1997)
[10]
Karjoth G., Authorization in CORBA security, J. Comput. Sec., 8, 2-3, pp. 89-108, (2000)