共 13 条
[1]
Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
[2]
Anderson A., 2006, SWS 06, P53
[4]
Dougherty DJ, 2007, LECT NOTES COMPUT SC, V4734, P375
[5]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[6]
Irwin K., 2006, P 13 ACM C COMPUTER, P134
[7]
LeFevre K., 2004, Proceedings of the Thirtieth International Conference on Very Large Data Bases, P108
[8]
Ni Q, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P41
[9]
Ni Q, 2007, LECT NOTES COMPUT SC, V4734, P72
[10]
Ni Q, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P133