Citation: | Zhu Xiaojie, Xiong Zhang, Wu Jinget al. New model for token role-based access control on enterprise portal[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(07): 873-876. (in Chinese) |
[1] 徐家俊,贾文玉.企业信息门户EIP[M].北京:机械工业出版社,2004 Xu Jiajun,Jia Wenyu.Enterprise information portal[M].Beijing:China Machine Press,2004(in Chinese) [2] Ferraiolo David,Kuhn Richard.Role-based access controls Proceedings of the 15th NIST-NCSC National Computer Security Conference. Baltimore:NIST-NCSC,1992:554-563 [3] Ferraiolo David,Barkley John,Kuhn Richard.A role-based access control model and reference implementation within a corporate intranet[J]. ACM Transaction on Information and System Security,1999,2(1):34-64 [4] 许峰,赖海光,黄皓,等.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693 Xu Feng,Lai Haiguang,Huang Hao,et al.Service-oriented role-based access control[J].Chinese Journal of Computers,2005,28(4):686-693(in Chinese) [5] Saltzer J H,Schroeder M D.The protection of information in computer systems[J].Proceedings of the IEEE,1975,63(9):1278-1308 [6] Wood C,Fernandez E B.Authorization in a decentralized database system Proceedings of the 5th International Conference on Very Large Databases.Brazil:IEEE Computer Society, 1979:352-359
|