共 3 条
[2]
Role-based authorization constraints specification[J] . Gail-Joon Ahn,Ravi Sandhu.ACM Transactions on Information and System Security (TISSEC) . 2000 (4)
[3]
Configuring role-based access control to enforce mandatory and discretionary access control policies[J] . Sylvia Osborn,Ravi Sandhu,Qamar Munawer.ACM Transactions on Information and System Security (TISSEC) . 2000 (2)