共 15 条
[1]
AccessRightsAdministrationinRole BasedSecuritySystems. NYANCHAMAM,OSBORNS. ProceedingsoftheIF IPWorkingGroup11.3WorkingConferenceonDatabaseSecurity . 1994
[2]
Authentication,AccessControlandIntrusionDetection. SANDHURS,SAMARATIP. TheComputerScienceandEn gineeringHandbook . 1997
[3]
Role basedAccessControlModels. SANDHURS,COYNEEJ,FEINSTEINHL,YOUMANCE. IEEE Computer . 1996
[4]
HowtoDoDiscretionaryAccessControlUsingRoles. SANDHUR,MUNAWERQ. ProceedingsoftheThirdACM WorkshoponRole BasedAccessControl RBAC’’98 . 1998
[5]
AccessControl:PrinciplesandPractice. SANDHUR,SAMARATIP. IEEE Communications Magazine . 1994
[6]
TheARBAC99ModelforAdministra tionofRole basedAccessControl. RAVISANDHU,QAMARMUNAWER. Pro ceedingsof15thAnnualComputerSecurityApplicationConference . 1999
[7]
Role BasedAdministrationofUser RoleAssignment:TheURA97Modeland ItsOracleImplementation. RAVISSANDHU,VENKATABHAMIDIPATI. TheJournalofComputerSecurity . 1999
[8]
AmericanNationalStandardforInformationTechnology Role BasedAccessControl. BSRINCITS3592003 .
[9]
Lattice BasedAccessControlModels. SANDHURS. IEEE Computer . 1993
[10]
MandatoryAccessControlandRole BasedAccessControlRevisited. OSBORNS. ProceedingsoftheSecondACM WorkshoponRole BasedAccessControl RBAC’’97 . 1997