Citation: | Ma Li, Ma Shilong, Sui Yuefeiet al. Representation for RBAC model with description logic DLRBAC[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(11): 1315-1319. (in Chinese) |
[1] Finin T,Joshi A,Kagal L,et al.ROWLBAC:representing role based access control in OWL //Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2008:73-82 [2] Sandhu R,Coyne E,Feinstein H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47 [3] Ferraiolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4(3):224-274 [4] Park J S,Sandhu R S.Role-based for access control on the Web[J].ACM Transactions on Information and System Security,2001,4(1):37-71 [5] Li Q,Zhang X,Xu M,et al.Towards secure dynamic collaborations with group-based RBAC model[J].Computer & Security,2009,28(5):260-275 [6] Kwon J,Moon C.Visual modeling and formal specification of constraints of RBAC using semantic web technology[J].Knowledge-Based Systems,2007,20(4):350-356 [7] Baader F,Calvanese D,McGuinness D L,et al.The description logic handbook[M].Cambridge:Cambridge University Press,2002 [8] McGuinness D L,van Harmelen F.OWL Web ontology language overview .MIT:W3C Recommendation,2004 .http://www.w3.org/TR/2004/REC-owl-features-20040210/ [9] Zhao C,Heilili N,Liu S,et al.Representation and reasoning on RBAC: a description logic approach //ICTAC2005,LNCS 3722.Berlin:Springer,2005:381-393 [10] Ji G,Tang Y,Jiang Y,et al.A description logic approach to represent and extend RBAC model //1st International Symposium on Pervasive Computing and Applications.Urumqi:IEEE Press,2006:151-156 [11] Yu H,Xie Q,Che H.Description logic based conflict detection methods for RB-RBAC model[J].International Journal of Computer Science and Network Security,2006,6(1A):120-125
|