共 3 条
[1]
Towards Formal Verification of Role-Based Access Control Policies[J] . Jha, Somesh,Li, Ninghui,Tripunitara, Mahesh,Wang, Qihua,Winsborough, William.IEEE Transactions on Dependable and Secure Computing . 2008 (4)
[2]
Beyond proof-of-compliance: security analysis in trust management[J] . Ninghui Li,John C. Mitchell,William H. Winsborough.Journal of the ACM (JACM) . 2005 (3)
[3]
The RRA97 Model for Role-based Administration of Role Hierarchies. Sandhu.R,Munawer.Q. Proceedings of the third ACM workshop on Role-based access control . 1998