[1] |
JOSHI J B D , BERTINO E , GHAFOOR A . Temporal hierarchies and inheritance semantics for GTRBAC[C]// Proceedings of the seventh ACM symposium on Access control models and technologies. New York:ACM Press, 2002: 74-83.
|
[2] |
DU S , JOSHI J B D . Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy[C]// Proceedings of the eleventh ACM symposium on Access control models and technologies. New York:ACM Press, 2006: 228-236.
|
[3] |
ZHANG Y , JOSHI J B D . A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies[C]// 2007 International Conference on Collaborative Computing:Networking,Applications and Worksharing. Piscataway:IEEE Press, 2007: 25-32.
|
[4] |
SHAHRAKI A S , RUDOLPH C , GROBLER M . A dynamic access control policy model for sharing of healthcare data in multiple domains[C]// 2019 18th IEEE International Conference On Trust,Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering. Piscataway:IEEE Press, 2019: 618-625.
|
[5] |
UNAL D , ?AGLAYAN M U . A formal role-based access control model for security policies in multi-domain mobile networks[J]. Computer Networks, 2013,57(1): 330-350.
|
[6] |
KAPADIA A , MUHTADI J A , CAMPBELL R H ,et al. IRBAC2000:secure interoperability using dynamic role translation[C]// Proceedings of the International Conference on Internet Computing. Saarland:DBLP, 2000: 231-238.
|
[7] |
AL-MUHTADI J , KAPADIA A , CAMPBELL R ,et al. The A-IRBAC 2000 model:administrative interoperable role-based access control[R]. Urbana-Champaign:University of Illinois,(2001-01)[2020-05-08].
|
[8] |
SHEHAB M , BERTINO E , GHAFOOR A . SERAT:secure role mapping technique for decentralized secure interoperability[C]// Proceedings of the tenth ACM symposium on Access control models and technologies. New York:ACM Press, 2005: 159-167.
|
[9] |
SHAFIQ B , JOSHI J B D , BERTINO E ,et al. Secure interoperation in a multidomain environment employing RBAC policies[J]. IEEE Transactions on Knowledge and Data Engineering, 2005,17(11): 1557-1577.
|
[10] |
FAN K , BAI Y , XU H ,et al. A secure cross-domain access control scheme in social networks[C]// IEEE International Conference on Communications. Piscataway:IEEE Press, 2019: 1-6.
|
[11] |
DIAO L , WANG H , ALSARRA S ,et al. A smart role mapping recommendation system[C]// 2019 IEEE 43rd Annual Computer Software and Applications Conference. Piscataway:IEEE Press, 2019,(2): 135-140.
|
[12] |
DIAZ-LOPEZ D , DOLERA-TORMO G , GOMEZ-MARMOL F ,et al. Managing XACML systems in distributed environments through meta-policies[J]. Computers & Security, 2015(48): 92-115.
|
[13] |
ZHANG Q F , LI H . MOEA/D:a multiobjective evolutionary algorithm based on decomposition[J]. IEEE Transactions on evolutionary computation, 2007,11(6): 712-731.
|
[14] |
DAS I , DENNIS J E . Normal-boundary intersection:a new method for generating the pareto surface in nonlinear multicriteria optimization problems[J]. SIAM journal on optimization, 1998,8(3): 631-657.
|