Computer Science ›› 2013, Vol. 40 ›› Issue (10): 155-158.
Previous Articles Next Articles
WANG Xiao-lin,SHI You-qun,TANG Cheng and XU Kang
[1] Xing Tian-yang,Cao Min.Research and application of algorithm for generating authority-tree based on TP-RBAC model[J].Computer Engineering and Design,2010,1(5):950-953 [2] 钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,1(6):779-784 [3] 信科,杨峰,杨光旭,等.基于RBAC权限管理系统的优化设计与实现[J].计算机技术与发展,2011,1(7):172-174 [4] Sandhu R,Coyne E J,Feinstein H,et al.Role-based access control models [J].IEEE Computer,1996,9(2):38-47 [5] Zhou Wei,Meinel C.Team and task based RBAC access control model[C]∥Network Operations and Management Symposium,2007,LANOMS 2007.Latin American,IEEE,2007:84-94 [6] Ferraiolo D,Kuhn R.Role-Based Access Controls[C]∥Procee-dings of the 15th NIST-NCSC National Computer Security Conference.1992:554-563 [7] Yu Su,Wang Yin,Hua Kun.The research of information security based on RBAC with SOD [J].International Journal of Advancements in Computing Technology,2012,4(14):482-490 [8] 杨彩侠,王小慧,曹旻.OF_RBAC权限控制模型的研究及应用[C]∥Proceedings of 2010International Conference on Management Science and Engineering.2010:65-69 [9] 董理君,胜生,杜敏,等.一种基于环境安全的角色访问控制模型研究[J].计算机科学,2009,6(1):1-54 |
No related articles found! |
|