共 5 条
- [1] Research Directions in Database Security. Lunt T F. New York: Springer-Verlag . 1992
- [2] Access rights administration in role-based security system. Nyancharn a M,Osborn S L. Database Security:Status & prospects, proceedings of the 8th Annual IFIP TC11 Working Conference on Database Security . 1994
- [3] Trusted Com puter System Evaluation Criteria Do D 5 2 0 0 . 2 8- STD. .
- [4] Information flow analysis in role-based security system. Nyanchama M, Osborn S L. Journal of Computing and Information . 1994
- [5] Role-Based access models. Sanhu R S, Coyne E J, Feinstein H L et al. IEEE Computer . 1996