Author:
Wang Hua,Cao Jinli,Zhang Yanchun
Publisher
Springer International Publishing
Reference99 articles.
1. Abiteboul, S., et al.: The lowell database research self-assessment. Commun. ACM 48(5), 111–118 (2005)
2. Aiman, A., Sylvia, O.: Mixing privacy with role-based access control. In: Fourth International Conference on Computer Science & Software Engineering, pp. 1–7 (2011)
3. Adams, A., Angela, S.M.: Privacy in multimedia communications: protecting users, not just data. In: Blandford, A., Vanderdonckt, J., Gray, P. (eds.) People and Computers XVInteraction without Frontiers, eds edn. Springer, London.
https://doi.org/10.1007/978-1-4471-0353-0_4
4. Barkley, J.F., Beznosov, K., Uppal, J.: Supporting relationships in access control using role based access control. In: Third ACM Workshop on Role Based Access Control, pp. 55–65 (1999)
5. Barth, A., Mitchell, J., Rosenstein, J.: Conflict and combination in privacy policy languages (summary). In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (2004)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献