Author:
Lawall Alexander,Schaller Thomas,Reichelt Dominik
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Crampton, J., Gutin, G.: Constraint expressions and workflow satisfiability. In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT ’13, pp. 73–84. ACM, New York (2013)
2. Denis, P., Chun-sheng, S.: Comparing the organization structure of management in canadian, russian and chinese enterprises. In: International Conference on Management Science and Engineering, ICMSE 200, pp. 859–866 (2009)
3. Jing, M., Cai, H., Bu, F.: Flexible organization structure-based access control model and application. In: 2011 IEEE Asia-Pacific Services Computing Conference (APSCC), pp. 1–8 (2011)
4. Liu, Q., Jiang, Y.-F., Rao, D.-N., Chen, X.-D.: Research of security analysis of arbac policy based on intelligence planning. In: 2008 International Conference on Computational Intelligence and Security, pp. 257–262 (2008)
5. Lee, J., Kang, S., Hur, S.: Access control using extended role graph corresponding to organizational hierarchy. In: 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI), pp. 468–473 (2011)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献