[1] 李红臣,史美林,陈信祥,等.工作流系统中的业务过程描述及分析[J].计算机研究与发展,2001,38(7): 798-804.
LI Hongchen, SHI Meilin, CHEN Xinxiang, et al. Business process modeling and analysis in workflow systems[J]. Journal of Computer Research and Development, 2001, 38(7): 798-804.
[2] 刑光林,洪帆.基于角色和任务的工作流访问控制模型[J].计算机工程与应用,2001,38(7): 798-804.
XING Guanglin, HONG Fan. A workflow access control model based on role and task[J]. Computer Engineering and Application, 2001, 38(7): 798-804.
[3] 洪帆,赵晓斐.基于任务的访问控制模型及其实现[J].华中科技大学学报:自然科学版,2002,30(1): 17-19.
HONG Fan, ZHAO Xiaofei. Taskbased access control model and its implementation[J]. Journal of Huazhong University of Science and Technology: Nature Science Edition, 2002,30(1): 17-19.
[4] ATLURI V, HUANG W K. An authorization model for workflows[C]∥Proceedings of the 5th European Symposium on Research in Computer Security. Rome: SpringerVerlag, 1996: 44-64.
[5] THOMAS R K, SANDHU R S. Taskbased authorization controls (TBAC): a family of models for active and enterpriseoriented authorization management[C]∥Proceedings of the IFIP WG11.3 Workshop on Database Security. Vancouver, Canada: Chapman & Hall, Ltd., 1997: 11-13.
[6] 邓集波,洪帆.基于任务的工作流访问控制模型[J].软件学报,2003,14(1): 76-82.
DENG Jibo, HONG Fan. Taskbased access control model[J]. Journal of Software, 2003,14(1): 76-82.
[7] 尹建伟,徐争前,冯志林,等.增强权限约束支持的基于任务访问控制模型[J].计算机辅助设计与图形学学报,2006,18(1): 143-148.
YIN Jianwei, XU Zhengqian, FENG Zhilin, et al. Taskbased access control model supported by enhanced permission constraints[J]. Journal of ComputerAided Design and Computer Graphics, 2006, 18(1): 143-148.
[8] SEJONG O, SEOG P. Taskrolebased access control model[J]. Information Systems, 2003, 28(6): 533-562.
[9] DEY A K. Providing architectural support for building contextaware applications[D]. Atlanta: Georgia Institute of Technology, 2001: 3-5.
[10] 韩伟力.分布式环境下的约束访问控制技术研究[D].杭州:浙江大学,2003: 24-85.
HAN Weili. Research of constraint access control technology under distributed environment [D].Hangzhou: Zhejiang University, 2003: 24-85.
[11] HAN Weili, ZHANG Junjing, YAO Xiaobo. Context sensitive access control model and implementation[C]∥Proceedings of 5th International Conference on Computer and Information Technology. Shanghai, China: IEEE, 2005: 751-756.
[12] NEUMANN G, STREMBECK M. An approach to engineer and enforce context constraints in an RBAC environment[C]∥Proceedings of 8th ACM Symposium on Access Control Models and Technologies. Como, Italy: ACM, 2003: 65-79.
[13] ZHANG G. Dynamic Context aware access control for grid applications[D]. New Brunswick: The State University of New Jersey, 2003: 5-36.
[14] ZHANG G, PARASHAR M. Dynamic contextaware access control for grid applications[C]∥Proceedings of the 4th International Workshop on Grid Computing. Washington: ACM, 2003: 101-109.
[15] HULSEBOSCH R J, SALDEN A H, BARGH M S, et al. Context sensitive access control[C]∥ Proceedings of 10th ACM Symposium on Access Control Models and Technologies. Stockholm, Sweden: ACM, 2005: 111-119.
[16] BHATTI R, BERTINO E, GHAFOOR A. A trustbased contextaware access control model for webservices[J]. Distributed and Parallel Databases, 2005, 18(1): 83-105.
[17] 徐仁佐,郑红军,陈斌,等.基于角色和上下文的访问控制模型[J].计算机应用研究,2004(12): 140-142.
XU Renzuo, ZHENG Hongjun, CHEN Bin, et al. Role and contextbased access control model[J]. Application Research of Computers, 2004(12): 140-142.
[18] TONINELLI A, MONTANARI R, KAGAL L, et al. A semantic contextaware access control framework for secure collaborations in pervasive computing environments[C]∥Proceedings of 5th International Semantic Web Conference. Athens, GA, USA: SpringerVerlag, 2006: 473-486.
[19] KULKARNI D, TRIPATHI A. Contextaware rolebased access control in pervasive computing system[C]∥Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Estes Park, CO, USA: ACM, 2008: 113-122.
[20] 姚寒冰,胡和平,李瑞轩.上下文感知的动态访问控制模型[J].计算机工程与科学,2007,29(5): 1-7.
YAO Hanbing, HU Heping, LI Ruixuan. A dynamic contextaware access control model[J]. Computer Engineering & Science, 2007, 29(5): 1-7.
[21] ALKAHTANI M. A family of models for rulebased userrole assignment[D]. Washington: George Mason University, 2004: 10-40.
[22] KERN A, WALHORN C. Rule support for rolebased access control[C]∥Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. Stockholm, Sweden: ACM, 2005: 130-138.
[23] 林植.基于策略的访问控制关键技术研究[D].武汉:华中科技大学,2006: 28-114.
LIN Zhi. Research on key technologies of policybased access control[D]. Wuhan: Huazhong University of Science and Technology, 2006: 28-114.
[24] 焦振海,丁二玉,骆斌.工作流管理中基于规则策略的访问控制[J].计算机应用研究,2008,25(3): 885-902.
JIAO Zhenhai, DING Eryu, LUO Bin. Access control in workflow management systems based on rule strategy[J]. Application Research of Computers, 2008,25(3): 885-902.
[25] 张健,孙吉贵,李妮娅,等.工作流系统中一个基于多权角色和规则的条件化RBAC安全访问控制模型[J].通信学报,2008,29(2): 8-16.
ZHANG Jian, SUN Jigui, LI Niya, et al. Conditioned secure access control model based on multiweighted roles and rules in workflow system[J]. Journal on Communications, 2008, 29(2): 8-16.
[26] DUNLOP N, INDULSKA J, RAYMOND K. Dynamic conflict detection in policybased management systems[C]∥Proceedings of the 6th International Enterprise Distributed Object Computing Conference. \
[S.l.\]: IEEE, 2002: 15-26.
[27] DUNLOP N, INDULSKA J, RAYMOND K. Methods for conflict resolution in policybased management system[C]∥Proceedings of the 7th International Enterprise Distributed Object Computing Conference. \
[S.l.\]: IEEE, 2003: 98-109.
[28] 何再朗,田敬东,张毓森.策略冲突分析、检测及解决方案[J].兰州理工大学学报,2005,31(5): 83-86.
HE Zailang, TIAN Jingdong, ZHANG Yusen. Analysis, detection and solution of policy conflict[J]. Journal of Lanzhou University of Technology, 2005, 31(5): 83-86.
[29] 姚键,茅兵,谢立.一种基于有向图模型的安全策略冲突检测方法[J].计算机研究与发展,2005, 42(7): 1108-1114.
YAO Jiang, MAO Bing, XIE Li. A Dagbased security policy conflict detection method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.
[30] 魏雁平.基于有向图覆盖关系的安全策略冲突检测模型[D].成都:四川大学, 2006: 7-72.
WEI Yanping. A policy conflict detection model based on directgraph with cover relation[D]. Chengdu: Sichuan University, 2006: 7-72.
[31] 姜琳.基于概念格的策略分类与冲突检测研究[D].长春:吉林大学,2006: 28-55.
JIANG Lin. The research of policy classification and conflict detection based on concept lattice[D]. Changchun: Jilin University, 2006: 28-55.
[32] BERTINO E. RBAC models: concepts and trends[J]. Computers and Security, 2003, 22(6): 511-514. |