[1] S Oh,S Park.Task-role based access control model[J].Journal of Information Systems,2003,28(6):533-562.[2] 翟治年,卢亚辉,等.增强伸缩性的主被动集成访问控制模型[J].计算机集成制造系统,2011,17(8):1609-1623. Zhai Z,Lu Y,et al.Scalability enhanced active-passive-integrated access control model[J].Computer Integrated Manufacturing Systems,2011,17(8):1609-1623.(in Chinese)[3] Wu S,A Sheth,J Miller J,et al.Authorization and access control of application data in workflow systems[J].Journal of Intelligent Information Systems,2002,18(1):71-94.[4] 翟治年,奚建清,等.主动授权管理中的关联继承机制[J].西安交通大学学报(自然科学版),2012,46(4):24-31. Zhai Z,Xi J,et al.Association inheritance mechanism in active authorization management[J].Journal of Xi'an Jiaotong University (Natural Science),2012,46(4):24-31.(in Chinese)[5] 邢光林,洪帆.基于角色和任务的工作流授权模型及约束描述[J].计算机研究与发展,2005,(11):1946-1953. Xing G,Hong F.A workflow authorization model based on role and task and constraints specification[J].Computer Research and Development,2005,42(11):1946-1953.(in Chinese)[6] Wang Q,Li n.Satisfiability and resiliency in workflow authorization systems[J].ACM Transactions on Information and System Security,2010,13(4):1-35.[7] J Wainer,P Barthelmess,A Kumar.W-rbac─a workflow security model incorporating controlled overriding of constraints[J].International Journal of Cooperative Information Systems,2003,12(4):455-485.[8] E Bertino,E Ferrari,V Atluri.The specification and enforcement of authorization constraints in workflow management systems[J].ACM Transaction on Information System Security,1999,2(1):65-104.[9] Liu D,Wu M,Lee S.Role-based authorizations for workflow systems in support of task-based separation of duty[J].Journal of Systems and Software,2004,73(3):375-387.[10] 李凤华,苏,史国振,等.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813. Li F,Su M,Shi G,et al.Research status and development trends of access control model[J].Acta Electronica Sinica,2012,40(4):805-813.(in Chinese)[11] 王小明,付红,张立臣.基于属性的访问控制研究进展[J].电子学报,2010,38(7):1660-1667. Wang X,Fu H,Zhang L.Research progress on attribute-based access control[J].Acta Electronica Sinica,2010,38(7):1660-1667.(in Chinese)[12] 王雅哲,冯登国.一种XACML规则冲突及冗余分析方法[J].计算机学报,2009,32(3):516-530. Wang Y,Feng D.Conflict and redundancy analysis method for xacml rules[J].Chinese Journal of Computers,2009,32(3):516-530.(in Chinese)[13] V Kolovski,J Hendler,B Parsia.Analyzing web access conttrol policies [A].Proceedings of the 16th International Conference on World Wide Web [C].Banff,Alberta,Canada,2007.677-686. |