共 40 条
- [1] Abadi M.(1993)A calculus for access control in distributed systems ACM Trans. Programm. Lang. Syst. 15 706-734
- [2] Burrows M.(1998)An access control model supporting periodicity constraints and temporal reasoning ACM Trans. Database Syst. 23 231-285
- [3] Lampson B.(2002)An algebra for composing access control policies ACM Trans. Inf. Syst. Secur. 5 1-35
- [4] Plotkin G.(2000)Design and implementation of an access control processor for XML documents Comput. Netw. 33 59-75
- [5] Bertino E.(2002)A fine-grained access control system for XML documents ACM Trans. Inf. Syst. Secur. 5 169-202
- [6] Bettini C.(2001)Controlling access to XML documents IEEE Internet Comput. 5 18-28
- [7] Ferrari E.(1996)Elements of style: analyzing a software design feature with a counterexample detector IEEE. Trans. Softw. Eng. 22 484-495
- [8] Samarati P.(2001)Flexible support for multiple access control policies ACM Trans. Database Syst. 26 214-260
- [9] Bonatti P.(1986)A structure-preserving clause form translation J. Symb. Comput. 2 293-304
- [10] De Capitani di Vimercati S.(1996)Authentication, access control, and audit ACM Comput. Surv. 28 241-243