|
11 |
Consistency maintenance for constraint in role-based access control model Enthalten in Zhe jiang da xue: Journal of Zhejiang University / Science A / Applied physics and engineering Bd. 3, 11.8.2017, Nr. 3, date:7.2002: 292-297
|
|
|
12 |
Dynamic Optimization of Role Concepts for Role-Based Access Control Using Evolutionary Algorithms Enthalten in SN Computer Science Bd. 4, 24.5.2023, Nr. 4, date:7.2023: 1-17
|
|
|
13 |
Fog-Assisted Blockchain-IoMT Healthcare Framework with Role-Based Access Control for Critically Ill Patients Enthalten in SN Computer Science Bd. 5, 18.6.2024, Nr. 6, date:8.2024: 1-13
|
|
|
14 |
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS Enthalten in Journal of grid computing Bd. 5, 28.12.2006, Nr. 1, date:3.2007: 65-81
|
|
|
15 |
Provisioning trust-oriented role-based access control for maintaining data integrity in cloud Enthalten in International journal of system assurance engineering and management Bd. 14, 9.9.2023, Nr. 6, date:12.2023: 2559-2578
|
|
|
16 |
Role based access control design using triadic concept analysis Enthalten in Zhongnan-Daxue: Journal of Central South University Bd. 23, 26.1.2017, Nr. 12, date:12.2016: 3183-3191
|
|
|
17 |
Similarity testing for role-based access control systems Enthalten in Journal of Software Engineering Research and Development Bd. 6, 17.1.2018, Nr. 1, date:12.2018: 1-37
|
|
|
18 |
Toward role-based provisioning and access control for infrastructure as a service (IaaS) Enthalten in Journal of internet services and applications Bd. 2, 8.9.2011, Nr. 3, date:12.2011: 243-255
|
|