共 22 条
[1]
Ahn GJ, 2003, TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, P202
[2]
A model for attribute-based user-role assignment
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:353-362
[3]
[Anonymous], INTEGRITY CONSIDERAT
[4]
Automated cross-organisational trust establishment on extranets
[J].
PROCEEDINGS OF THE WORKSHOP ON INFORMATION TECHNOLOGY FOR VIRTUAL ENTERPRISES, ITVE 2001,
2001, 23 (06)
:3-11
[5]
BARRETT S, 1982, MIS Q, P83
[6]
Designing role hierarchies for access control in workflow systems
[J].
25TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE,
2001,
:117-122
[7]
CHARLES E, 2002, P 7 ACM S ACC CONTR, P87
[8]
Chen CY, 1999, BIOMED CHROMATOGR, V13, P11, DOI 10.1002/(SICI)1099-0801(199902)13:1<11::AID-BMC764>3.0.CO
[9]
2-V
[10]
Dimmock N., 2004, Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, P156, DOI [DOI 10.1145/990036.990062, 10.1145/990036.990062]