[1]
|
Y. S. Fan, “Connotation and key technologies of net-worked manufacturing,” Computer Integrated Manufac-turing Systems, Vol. 9, No. 7, pp. 576-582, 2003.
|
[2]
|
P. Ward and C. L. Smith, “The development of access control policies for information technology systems,” Computers & Security, Vol. 21, No. 4, pp. 356-371, 2002.
|
[3]
|
C. P. Pfleger, “Security in computing,” 2nd Edition, Pren-tice-Hall International Inc., Englewood Cliffs, NJ, 1997.
|
[4]
|
S. Oh and S. Park, “Task-role-based access control model,” Information Systems, Vol. 28, pp. 533-562, 2003.
|
[5]
|
J. Hwang, K. Wu, and D. Liu, “Access control with role attribute certificates,” Computer Standards & Interfaces, Vol. 22, pp. 43-53, 2000.
|
[6]
|
J. Deng and F. Hong, “Task-based access control model,” Journal of Software, Vol. 14, No. 1, pp. 76-82, 2003.
|
[7]
|
T. Xin and I. Ray, “A lattice-based approach for updating access control policies in real-time,” Information Systems, Vol. 32, pp. 755-772, 2007.
|
[8]
|
S. Fu and C. Z. Xu, “Coordinated access control with temporal and spatial constraints on mobile execution in coalition environments,” Future Generation Computer Systems, Vol. 23, pp. 804-815, 2007.
|
[9]
|
H. X. Cai, T. Yu, and M. L. Fang, “Access control of manufacturing grid,” Computer Integrated Manufacturing Systems, Vol. 13, No. 4, pp. 716-720, 2007.
|
[10]
|
C. Liang, T. Y. Xiao, L. X. Zhang, “Access control for collaborative environment in networked manufacturing system,” Computer Integrated Manufacturing Systems, Vol. 13, No. 1, pp. 136-140, 152, 2007.
|
[11]
|
T. Bray, J. Paoli, and C. M. Sperberg-McQueen (Eds), “Extensible Markup Language (XML) 1.0 (2nd Ed.),” W3C Recommendation, October 2000.
|
[12]
|
R. Sandhu, E. J. Conyne, H. Lfeinstein, and C. E. You-man, “Role based access control models,” IEEE com-puter, Vol. 29, No. 2, pp. 38-47, 1996.
|
[13]
|
W. H. Chen, X. C. Yin, B. Mao, and L. Xie, “A task and role-based access control model for web,” Journal of Computer Research and Development, Vol. 41, No. 9, pp. 1466-1473, 2004.
|
[14]
|
Extensible Markup Language (XML) 1.0-W3C Recom-mendation 10-Feb-98.
Http://www.w3.org/TR/1998/REC-xml-19980210.
|
[15]
|
N. N. Vuong, G. S. Smith, and Y. Deng, “Managing secu-rity policies in a distributed environment using eXtensible Markup Language (XML) ,” SAC, pp. 405-411, 2001.
|
[16]
|
V. Kapsalis, L. Hadellis, D. Karelis, and S. Koubias, “A dynamic context-aware access control architecture for e-services,” Computers & Security, Vol. 25, pp. 507-521, 2006.
|
[17]
|
C. A. Ardagna, E. Damiani, S. De Capitani di Vimercati, and P. Samarati, “XML-based access control languages,” Information Security Technical Report. Vol. 9, No. 3, pp. 1363-4127, 2004.
|
[18]
|
C. Lu, X. J. Hu, C. L. He, etc., “Oracle 10g DBA,” Pub-lishing House of Electronics Industry, January 2007.
|
[19]
|
L. Y. Wan, “Project of a VPD design based on role access control in Oracle,” Journal of Jiangxi Institute of Education (Comprehensive), Vol. 28, No. 3, pp. 33-36. 2007.
|
[20]
|
L. Yao, and H. Z. Chen, “Oracle HTML DB application with virtual private database,” System Simulation Tech-nology, Vol. 2, No. 4, pp. 244-248, 2006.
|
[21]
|
[A. L. Zhong and F. H. Xu, “A method of using manage-ment of role to enhance the security of ORACLE data-base,” Journal of Chengdu University (Natural Science Edition), Vol. 26, No. 3, pp. 225-227, 2007.
|
[22]
|
K. Zhou, X. X. Wen, G. Wang, M. Lv, and Y. Q. Gong, “Key technologies of manufacturing information system management supporting networked manufacturing,” IEEE International Conference on Engineering, Services and Knowledge Management (the Management track of WiCom 2007), Shanghai, China, pp.6240-6243, Sep-tember 23-25, 2007.
|