Author:
Ma Chen-hua,Lu Guo-dong,Qiu Jiong
Publisher
Zhejiang University Press
Reference27 articles.
1. Ahn, G.J., Sandhu, R., 2000. The RCL 2000 Language for Specifying Role-Based Authorization Constraints. PhD Thesis, George Mason University, Fairfax, Virginia, USA.
2. Alsulaiman, F.A., Miege, A., EI Saddik, A., 2007. Threshold-Based Collaborative Access Control. Proc. Int. Symp. on Collaborative Technologies and Systems, p.45–56. [doi:10.1109/CTS.2007.4621737]
3. Ardagna, C.A., Cremonini, M., de Capitani di Vimercati, S., Samarati, P., 2008. A privacy-aware access control system. J. Comput. Secur., 16(4):369–397. [doi:10.3233/JCS-2008-0328]
4. Carminati, B., Ferrari, E., 2008. Privacy-Aware Collaborative Access Control in Web-Based Social Networks. Proc. 22nd Annual IFIP WG 11.3 Working Conf. on Data and Applications Security, p.81–96. [doi:10.1007/978-3-540-70567-3_7]
5. Crampton, J., 2003. Specifying and Enforcing Constraints in Role-Based Access Control. Proc. 8th ACM Symp. on Access Control Models and Technologies, p.43–50. [doi:10.1145/775412.775419]
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献