[1] Finin T,Joshi A,Kagal L,et al.ROWLBAC:representing role based access control in OWL //Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2008:73-82[2] Sandhu R,Coyne E,Feinstein H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47[3] Ferraiolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4(3):224-274[4] Park J S,Sandhu R S.Role-based for access control on the Web[J].ACM Transactions on Information and System Security,2001,4(1):37-71[5] Li Q,Zhang X,Xu M,et al.Towards secure dynamic collaborations with group-based RBAC model[J].Computer & Security,2009,28(5):260-275[6] Kwon J,Moon C.Visual modeling and formal specification of constraints of RBAC using semantic web technology[J].Knowledge-Based Systems,2007,20(4):350-356[7] Baader F,Calvanese D,McGuinness D L,et al.The description logic handbook[M].Cambridge:Cambridge University Press,2002[8] McGuinness D L,van Harmelen F.OWL Web ontology language overview .MIT:W3C Recommendation,2004 .[9] Zhao C,Heilili N,Liu S,et al.Representation and reasoning on RBAC: a description logic approach //ICTAC2005,LNCS 3722.Berlin:Springer,2005:381-393[10] Ji G,Tang Y,Jiang Y,et al.A description logic approach to represent and extend RBAC model //1st International Symposium on Pervasive Computing and Applications.Urumqi:IEEE Press,2006:151-156[11] Yu H,Xie Q,Che H.Description logic based conflict detection methods for RB-RBAC model[J].International Journal of Computer Science and Network Security,2006,6(1A):120-125
|