2OSBORN S,SANDHU R,MUNAWER Q.Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and System Security,2000,3(2):85-106. 被引量:1
3KAPADIA A,AL-MUHTADI J,CAMPBELL R.Secure interoperability using dynamic role translation[C]∥ Proceedings of the First International Conference on Internet Computing.Las Vegas:CSREA Press,2000:231-238. 被引量:1
4JOSHI J B D,BHATTI R,BERTINO E,et al.Access-control language for multidomain environments[J].IEEE Internet Computing,2004,8(6):40-50. 被引量:1
5BONATTI P,VIMERCATI S D C,SAMARATI P.An algebra for composing access control policies[J].ACM Transactions on Information and System Security,2002,5(1):1-35. 被引量:1
6SHAFIQ B,JOSHI J B D,BERTINO E,et al.Secure interoperation in a multidomain environment employing RBAC policies[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(11):1557-1577. 被引量:1
7AO Xu-hui,NAFTALY H.Flexible regulation of distributed coalitions[C]∥Proceedings of the 8th European Symposium on Research in Computer Security.Berlin:Springer,2003:29-60. 被引量:1
8SANDHU R,FERRAIOLO D,RICHARD K.The NIST model for role-based access control:towards a unified standard[J].ACM Transactions on Information and System Security,2001,4(3):224-274. 被引量:1
9GONG L,QIAN X L.Computational issues in secure interoperation[J].IEEE Transactions on Software and Engineering,1996,22(1):43-52. 被引量:1
10KOCH M,MANCINI L V,PARISI-PRESICCE F.A graph based formalism for RBAC[J].ACM Transactions on Information and System Security,2002,5(3):332-365. 被引量:1