| Citation: | Li Jian, Tang Wenzhong, Song Changfuet al. Application of RoleBased Access Control in Management Information System[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(6): 534-538. (in Chinese) |
|
[1] 谭伟贤,杨力平. 计算机网络安全教程[M]. 北京:国防工业出版社,2001.61~64 Tan Weiqiang,Yang Liping. Computer network security tutorial[M]. Beijing:National Defence Industry Press,2001.61~64(in Chinese) [2] 马林胜. 数据库应用系统用户权限适应性研究及其在管理信息系统中的实现. 北京:北京航空航天大学机械工程及自动化学院,2002 Ma Linsheng. Research of adaptability of user popedom in database-based application system and it's realization in manage information system. Beijing:School of Mechanical Engineering and Automation,Beijing University of Aeronautics and Astronautics, 2002(in Chinese) [3] 刘启原,刘 怡. 数据库与信息系统的安全[M].北京:科学出版社,2000.63~66 Liu Qiyuan,Liu Yi. Database and information system security[M]. Beijing:Science Press,2000.63~66(in Chinese) [4] 李孟珂,余祥宣. 基于角色的访问控制技术及应用[J]. 计算机应用研究,2000,(10):44~47 Li Menke,Yu Xiangxuan. Technology of role-based access control and it's application[J].Computer Application Research,2000,(10):44~47(in Chinese) [5] 曹天杰,张永平. 管理信息系统中基于角色的访问控制[J]. 计算机应用,2001,21(8):21~23 Cao Tianjie,Zhang Yongping. Role-based access control in management information system [J]. Computer Applications,2001,21(8):21~23(in Chinese) [6] Kim K H. Boolean matrim theory and applications[M]. USD:Dekker, Marcel Incorporated,1982 [7] Sanhu R S,Coyne E J,Feinstein H L,et al. Role-base access models. EIII Computer,1996,29(2) [8] Ahn G J,Arvisandhu. Role-based authorization constraints specification[J]. ACM Transcations on Information and System Security, 2002,3:207~226
|