1 |
Marie A. Wright, 'An Overview of PKI', Computers & Security, Vol. 15, Issue 4, pp.515-516, 1999
|
2 |
Edward C. Cheng, 'An object-oriented organizational model to support dynamic role-based access control in electronic commerce', Decision Support Systems, Vol. 29, Issue 4, pp.362-363, 2000
|
3 |
Rayford B. Vaughn, Ronda Henning and Kevin Fox, 'An empirical study of industrial security-engineering practices', Journal of Systems and Software, Vol. 61, Issue 3, pp.227, 2001
|
4 |
Reinhardt A. Botha and Jan H. P. Eloff, 'Access Control in Document-centric Workflow Systems An Agent-based Approach', Computers & Security, Vol. 20, Issue 6, pp.529-530, 2001
|
5 |
Sharman Lichtenstein, 'Information Security Design Principles for Adaptive Organizations', Computer Audit Update, Issue 6, pp.8-9, 1996
|
6 |
Chu-Hsing Lin, 'Dynamic key management schemes for access control in a hierarchy', Computer Communications, Vol. 20, Issue 15, pp.338, 2000
DOI
ScienceOn
|
7 |
Jing-Jang, Kou-Chen and Duen-Ren, 'Access control with role attribute certificates', Computer Standards & Interfaces, Vol. 22, pp.47-48, 2000
|
8 |
L. Labuschagne and J. H. P. Eloff, 'Improved system-access control using complementary technologies', Computers & Security, Vol. 16, Issue 6, pp.545-547, 1997
|
9 |
정원혁, "Microsoft SQL Server", 대림출판사, pp.480-492, 2001
|
10 |
Ahmed Patel, 'Access control mechanisms in digital library services', Computer Standards & Interfaces, Vol. 23, Issue 1, pp.21-22, 2001
|