共 13 条
[1]
[Anonymous], IEEE T SOFTWARE ENG
[2]
Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
[3]
HALE J, 1998, P DATABASE SECURITY, V12, P109
[4]
HE Q, 1998, P 3 AUSTR C INF SEC, P99
[5]
HOSMER HH, 1992, ACM SIGSAC REV, P18
[6]
JONSCHER D, 1995, P 9 ANN WORK C DAT S, P43
[7]
KUHNHAUSER WE, 1995, P 7 CAN COMP SEC S, P1
[8]
Sandhu R., 1996, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, P65
[9]
Sandhu R., 2000, Symposium on Access Control Models and Technologies: Proceedings of the fifth ACM workshop on Role-based access control, V26, P47
[10]
SCHORR H, 1997, WORKSH RES DEV OPP F