共 5 条
- [2] Configuring role-based access control to enforce mandatory and discretionary access control policies[J] . Sylvia Osborn,Ravi Sandhu,Qamar Munawer.ACM Transactions on Information and System Security (TISSEC) . 2000 (2)
- [3] An algebra for composing access control policies[J] . Piero Bonatti,Sabrina De Capitani di Vimercati,Pierangela Samarati.ACM Transactions on Information and System Security (TISSEC) . 2002 (1)
- [5] Workflow authorisation in mediator-free environments[J] . Mohamed Shehab,Elisa,Bertino,Arif,Ghafoor.Int. J. of Security and Networks . 2006 (1/2)