共 32 条
[1]
ADAM N, 1998, CONTENT BASED AUTHOR
[2]
Adam Nabil, 1996, ACM COMPUTING SURVEY, V28
[3]
ALTURI V, 1996, P 4 EUR S RES COMP S
[4]
[Anonymous], 1995, NETWORK SECURITY PRI
[5]
BARU CK, 1998, P 3 ACM INT C DIG LI, P275
[6]
Bertino E., 2000, Journal of Computer Security, V8, P109
[7]
A logical framework for reasoning on data access control policies
[J].
PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP,
1999,
:175-189