共 9 条
[1]
Astrahan M. M., 1976, ACM Transactions on Database Systems, V1, P97, DOI 10.1145/320455.320457
[2]
Framework for role-based delegation models
[J].
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2000,
:168-176
[3]
Bertino E., 1996, 3rd ACM Conference on Computer and Communications Security, P169, DOI 10.1145/238168.238211
[4]
BERTINO E, 1997, IEEE T KNOWL DATA EN, V9, P1
[5]
Fagin R., 1978, ACM Transactions on Database Systems, V3, P310, DOI 10.1145/320263.320288
[6]
A logical language for expressing authorizations
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:31-42
[7]
JAJODIA S, 2001, IN PRESS ACM T DATAB
[8]
JAJODIA S, 1997, P ACM SIGMOD INT C M, P474
[9]
PATRICIA P, 1976, ACM T DATABASE SYST, V1, P242