[1] SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[J]. Computer, 1996,29(2):38-47.
[2] SNYDER L. Formal models of capability-based protection systems[J]. IEEE Transactions on Computers, 1981(3):172-181.
[3] FERRAIOLO D F, KUHN D R. Role-based access control[C]// The 15th National Computer Security Conference. 1992:554-563.
[4] THOMAS R K, SANDHU R. Task-based authorization controls (TBAC): A family of models for activeand enterprise-oriented authorization management[C]// Proceedings of the IFIP WG11.3 Workshop on Database Security. 1997:166-181.
[5] THOMAS R. Team-based access control (TMAC): A primitive for applying role-based access controlsin collaborative environments[C]// The 2nd ACM Workshop on Role-based Access Control. 1997:13-19.
[6] ARDAGNA C A, CREMONINI M, DAMIANI E, et al. Supporting location-based conditions in access control policies[C]// 2006 ACM Symposium on Information, Computer and Communications Security. 2006:212-222.
[7] RAY I, KUMAR M, YU L. LRBAC: A location-aware role-based access control model[C]// International Conference on Information Systems Security. 2006:147-161.
[8] COVINGTON M J, SASTRY M R. A contextual attribute-based access control model[C]// Proceedings of 2006 International Conferences on “On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET”. 2006:1996-2006.
[9] CHAKRABORTY S, RAY I. TrustBAC: Integrating trust relationships into the RBAC model for access control in open systems[C]// The 11th ACM Symposium on Access Control Models and Technologies. 2006:49-58.
[10]张强,郑洪源,丁秋林. 基于任务和角色的工作流多约束访问控制模型[J]. 计算机与现代化, 2011(12):9-12.
[11]邓瑞芝,祝胜林. 空间数据库的访问控制技术[J]. 计算机与现代化, 2010(1):136-139.
[12]CASTIGLIONE A, SANTIS A D, MASUCCI B, et al. Hierarchical and shared access control[J]. IEEE Transactions on Information Forensics & Security, 2016,11(4):850-865.
[13]黄姝娟,朱怡安,高武奇,等. 双重触发的嵌入式系统内核安全访问控制[J]. 计算机与现代化, 2018(5):83-89.
[14]李凤华,王彦超,殷丽华,等. 面向网络空间的访问控制模型[J]. 通信学报, 2016,37(5):9-20.
[15]VENKATASUBRAMANIAN K K, MUKHERJEE T, GUPTA S K S. CAAC:An adaptive and proactive access control approach for emergencies in smart Infrastructures[J]. ACM Transactions on Autonomous & Adaptive Systems, 2014,8(4):20.
[16]BAKAR A A, GHAPAR A A, ISMAIL R. Access control and privacy in MANET emergency environment[C]// IEEE International Conference on Computer & Information Sciences. 2014.
[17]SCHEFER-WENZL S, STREMBECK M. Generic support for RBAC break-glass policies in process-aware information systems[C]// ACM Symposium on Applied Computing. 2013:1441-1446.
[18]DANIEL D L, GINS D T, FLIX G M, et al. Dynamic counter-measures for risk-based access control systems: An evolutive approach[J]. Future Generation Computer Systems, 2016,55(C):321-335.
[19]PENG Y, SONG Y, JU H, et al. Study of cross-domain access control among emergency organizations based on position-mapping[J]. Computer Engineering, 2014(6):104-108.
[20]倪川. 支持协作危机管理的ABAC扩展模型研究[D]. 南京:南京航空航天大学, 2015.
[21]FUGINI M, TEIMOURIKIA M. Risks in smart environments and adaptive access controls[C]// The 4th IEEE International Conference on Innovative Computing Technology. 2014:97-102.
[22]林莉,怀进鹏,李先贤. 基于属性的访问控制策略合成代数[J]. 软件学报, 2009,20(2):403-414. |