Author:
Li Zang,Chu Chao-Hsien,Yao Wen
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference33 articles.
1. A content-based authorization model for digital libraries;Adam;IEEE Transactions on Knowledge and Data Engineering,2002
2. Ashley P, Hada S, Karjoth G, Powers C, Schunter M. Enterprise privacy authorization language (EPAL 1.1). IBM Research Report; 2003.
3. Behaviour profiling with ambient and wearable sensing;Atallah;IFMBE Proceedings,2007
4. Bertino E, Samarati P, Jajodia S. Authorizations in relational database management systems. In: Proceedings of the 1st ACM conference on computer and communications security; 1993. p. 130–9.
5. Bertino E, Buccafurri F, Ferrari E, Rullo P. A logical framework for reasoning on data access control policies. In: Proceedings of the 12th IEEE computer security foundations workshop; 1999. p. 175–89.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献