共 14 条
- [1] An algebra for composing access control policies[J] . Piero Bonatti,Sabrina De Capitani di Vimercati,Pierangela Samarati.  ACM Transactions on Information and System Security (TISSEC) . 2002 (1)
- [2] EXAM: a comprehensive environment for the analysis of access control policies[J] . Dan Lin,Prathima Rao,Elisa Bertino,Ninghui Li,Jorge Lobo.  International Journal of Information Security . 2010 (4)
- [6] 数理逻辑与集合论[M]. 清华大学出版社 , 石纯一,王家〓编著, 2000
- [7] JavaBDD Reference. SourceForge. http://javabdd.sourceforge.net . 2007
- [8] Role Based Access Control. NIST. http://csrc.nist.gov/groups/SNS/rbac . 2012
- [9] eXtensible Access Control Markup Lan-guage(XACML). Rissanen E. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-en.html . 2012
- [10] Access controlpolicy combining:Theory meets practice. Li Ning-hui,Lin Dan,Rao P,et al. Pro-ceedings of the 14th ACM Symposium on Access Con-trol Models and Technologies . 2009