共 5 条
[2]
Configuring role-based access control to enforce mandatory and discretionary access control policies[J] . Sylvia Osborn,Ravi Sandhu,Qamar Munawer.ACM Transactions on Information and System Security (TISSEC) . 2000 (2)
[3]
An access control model supporting periodicity constraints and temporal reasoning
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1998, 23 (03)
:231-285
[4]
Expressive Power of the Schematic Protection Model[J] . Ravi S. Sandhu.Journal of Computer Security . 1992 (1)