Author:
Zhu Xuan-Lin,Dong Chang-Long,Li Yong,Yang Fei,Zhao Yang,Liu Wen-Wen
Publisher
Springer Nature Singapore
Reference17 articles.
1. Peng, Y., Jiang, C., Xie, F., Dai, Z., Xiong, Q., Gao, Y.: Industrial control system cybersecurity research. J. Tsinghua Univ. (Science and Technology) 52, 1396–1408 (2012)
2. Mingxing, L., Yu, M., Xinyan, Z., Wei, J., Jun, H.: Research on cyber security technique of safety DCS gateway in nuclear power plants. Nucl. Pow. Eng. (2018)
3. Tomar, K., Tyagi, S.S.: Enhancing network security and performance using optimized ACLS. Int. J. Found. Comput. Sci. Technol. 4, 25–35 (2014)
4. Coulouris, George; Dollimore, Jean; Roberts, Marcus, Role and task-based access control in the PerDiS groupware platform, ACM (1998)
5. Thomas, T., Sandhu, R.: Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented autorization management. In: Proceedings of the Ifip Wg11 Workshop on Database Security Lake Tahoe, pp. 166–181 (1998)