已选(0)清除
条数/页: 排序方式:
|
| An ASP Based Approach of Inter-domain Role Mapping 其他 2013-01-01 Zhang, Wei; Lin, Zuoquan
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13
|
| Representation and reasoning on RBAC: A nonmonotonic approach 其他 2013-01-01 Zhang, Wei; Lin, Zuoquan
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:6/0  |  提交时间:2015/11/13 |
| Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy 其他 2013-01-01 Zhu, Yan; Ahn, Gail-Joon; Hu, Hongxin; Ma, Di; Wang, Shanbiao
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2015/11/11
|
| A logic-based RBAC framework for flexible policies 其他 2012-01-01 Zhang, Wei; Lin, Zuoquan
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13 |
| 一种面向多租户云存储平台的访问控制策略 期刊论文 小型微型计算机系统, 2011 沈晴霓; 杨雅辉; 禹熹; 张力哲; 陈钟
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12
|
| Cardinality constraint access control model and implementation 期刊论文 advances in information sciences and service sciences, 2011 Zhang, Zhikun; Geng, Youping; Xiao, Jianguo; Huang, Zhonghui
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2015/11/17 |
| Cryptographic role-based security mechanisms based on role-key hierarchy 其他 2010-01-01 Zhu, Yan; Ahn, Gail-Joon; Hu, Hongxin; Wang, Huaixi
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13 |
| 带负授权RBAC模型的OWL表示及冲突检测 其他 2010-01-01 努尔买买提·黑力力; 开依沙尔·热合曼
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:1/0  |  提交时间:2015/10/23
|
| Cardinality constraint analyse and implementation in access control model 其他 2010-01-01 Zhang, Zhikun; Geng, Youping; Xiao, Jianguo
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2015/11/13 |
| The Fine-Grained Security Access Control of Spatial Data 其他 2010-01-01 Ma, Fuguang; Gao, Yong; Yan, Menglong; Xu, Fuchun; Liu, Ding
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2015/11/13
|