[1] |
SANDHU R S , COYNE E J , FEINSTEIN H L , et al. Role-based access control models[J]. Computer, 1996,29(2):38-47.
|
[2] |
SANDHU R , BHAMIDIPATI V , MUNAWER Q . The ARBAC97 model for role-based administration of roles[J]. ACM Transactions on Information & System Security, 1999,2(1):105-135.
|
[3] |
李凤华, 苏铓, 史国振 , 等. 访问控制模型研究进展及发展趋势[J]. 电子学报, 2012,40(4):805-813. LI F H , SU M , SHI G Z , et al. Research status and development trends of access control model[J]. Acta Electronica Sinica, 2012,40(4):805-813.
|
[4] |
RANISE S , TRUONG A , ARMANDO A . Scalable and precise auto-mated analysis of administrative temporal role-based access con-trol[C]// ACM Symposium on Access Control Models and Technolo-gies. ACM, 2014:103-114.
|
[5] |
XU D , KENT M , THOMAS L , et al. Automated model-based testing of role-based access control using predicate/transition nets[J]. IEEE Transactions on Computers, 2015,64(9):2490-2505.
|
[6] |
STOLLER S D , YANG P , GOFMAN M I , et al. Symbolic reachability analysis for parameterized administrative role-based access con-trol[C]// ACM Symposium on Access Control Models and Technolo-gies. ACM. 2009:148-164.
|
[7] |
UZUN E , ATLURI V , VAIDYA J , et al. Security analysis for temporal role based access control[J]. Uzun Emre, 2014,22(6):177-186.
|
[8] |
BERTINO E , BONATTI P A , FERRARI E . TRBAC: a temporal role-based access control model[J]. ACM Transactions on Information& System Security, 2001,4(3):191-233.
|
[9] |
SHARMA M , SURAL S , VAIDYA J , et al. AMTRAC: an administra-tive model for temporal role-based access control[J]. Computers &Security, 2013,39(39):201-218.
|
[10] |
TOAHCHOODEE M , RAY I . On the formalization and analysis of a spatio-temporal role-based access control model[C]// IFIP Wg 11.3 Working Conference on Data and Applications Security. Springer-Verlag, 2008:399-452.
|
[11] |
谭智勇, 刘铎, 司天歌 , 等. 一种具有可信度特征的多级安全模型[J]. 电子学报, 2008,36(8):1637-1641. TAN Z Y , LIU D , SI T G , et al. A multilevel security model with credibil-ity characteristics[J]. Acta Electronica Sinica, 2008,36(8):1637-1641.
|
[12] |
BO L , CHUNXIA J , YILIN L . A user access policy based on dynamic sensitivity label[C]// Network Computing and Information Security, International Conference on IEEE. 2011:13-16.
|
[13] |
李凤华, 王巍, 马建峰 , 等. 基于行为的访问控制模型及其行为管理[J]. 电子学报, 2008,36(10):1881-1890. LI F H , WANG W , MA J F , et al. Action-based access control model and administration of actions[J]. Acta Electronica Sinica, 2008,36(10):1881-1890.
|
[14] |
李良军 . PLM 中权限控制的研究与设计[D]. 西安: 西安电子科技大学, 2012. LI L J . Research and design of access-control in product lifecycle management (PLM)[D]. Xi'an: Xidian University, 2012.
|