[1]
Sandhu R., Bhamidipati V. The ASCAA Principles for Next-Generation Role-Based Access Control. In: Proceedings of 3rd International Conference on Availability, Reliability and Security. Barcelona, Spain(2008).
Google Scholar
[2]
Sandhu R., Bhamidipati. R, Munawer.R. The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and System Security, 2(1): 105-135 (1999).
DOI: 10.1145/300830.300839
Google Scholar
[3]
Hu J.W., Li R.X. Lu Z.D. On Role Mappings for RBAC-based Secure Interoperation. In: Proceeding of 2009 Third International Conference on Network and System Security, Wuhan, China (2009).
DOI: 10.1109/nss.2009.76
Google Scholar
[4]
Cholvy L., Cuppens F. Analyzing consistency of security policies. In: Proceedings of 1997 IEEE Symposium on Security and Privacy, Oakland, USA (1997).
DOI: 10.1109/secpri.1997.601324
Google Scholar
[5]
Chen T.Y., Chen Y.M., Chu H.C. et al. Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises. International Journal of Computer Integrated Manufacturing, 21(3): 301-324(2008).
DOI: 10.1080/09511920701196950
Google Scholar
[6]
Jiang Y. Liu W.J. Jin T.G. A Trust Evaluation algorithm for Secure Information Sharing in Collaborative Environment. In: Proceeding of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China (2008).
DOI: 10.1109/paciia.2008.204
Google Scholar
[7]
Li Q., Zhang X.W., Xu M.W. et al. (2009) Towards secure dynamic collaborations with group-based RBAC model. Computers & Security, 28(5): 260-275(2009).
DOI: 10.1016/j.cose.2008.12.004
Google Scholar
[8]
Lu Y.H., Zhang L., Sun J.G. Task-activity based access control for process collaboration environments. Computers in Industry, 60(6): 403-415(2009).
DOI: 10.1016/j.compind.2009.02.009
Google Scholar
[9]
Nasirifard P., Peristeras V., Decker S. Annotation-based access control for collaborative information spaces. Computers in Human Behavior 27(4): 1352-1364 (2011).
DOI: 10.1016/j.chb.2010.07.030
Google Scholar
[10]
Sun YQ, Gong B., Meng X.X., et al. Specification and enforcement of flexible security policy for active cooperation. Information Sciences, 179 (15): 2629-264(2009).
DOI: 10.1016/j.ins.2009.01.040
Google Scholar
[11]
Joshi J.B.D., Bhatti R. , Bertino E. et al. Access Control Language for Multi-domain Environments. IEEE Internet Computing 8(6): 40-50(2004).
Google Scholar
[12]
Shafiq B., Joshi J.B.D., Bertino E. et al. (2005). Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies. IEEE Transactions on Knowledge and Data Engineering. 17(11): 1557-1577.
DOI: 10.1109/tkde.2005.185
Google Scholar
[13]
Blum A, Furst M. Fast planning t hrough planning graph analysis. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence, Québec, Canada(1995).
Google Scholar
[14]
Blum A, Furst M L. Fast planning through planning graph analysis. Artificial Intelligence, 90(1-2): 281-300(1997).
DOI: 10.1016/s0004-3702(96)00047-1
Google Scholar