Author:
Lui Richard W. C.,Hui Lucas C. K.,Yiu S. M.
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights (2003), http://eprint.iacr.org/curr/
2. Ferraiolo, D.F., Barklery, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security 2(1), 34–64 (1999)
3. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-based access control. Artech House, Boston (2003)
4. Hitchens, M., Varadharajan, V., Saunders, G.: Policy administration domains. In: ACISP, pp. 286–302 (2002)
5. Lecture Notes in Computer Science;S. Kim,1997