Qi-hong LIU Xiao-nian WU Li YANG. Weighted trust computation method based on behaviors of users[J]. Journal of Computer Applications, 2011, 31(07): 1887-1890.
[1]SIMON R,ZURKO M E. Separation of duty in role-based environments[C]// Proceedings of 10th Computer Security Foundations Workshop. Washington, DC:IEEE Computer Society, 1997:183-194.[2]ANSI INCITS 359-2004. American national standard for information technology-role based access control[S],2004.[3]LI NINGHUI, TRIPUNITARA M V, BIZRI Z. On mutually-exclusive roles and separation of duty[J]. ACM Transactions on Information and System Security, 2007, 10(2):42-51.[4]LI NINGHUI, WANG QIHUA. Beyond separation of duty: An algebra for specifying high-level security policies[J]. Journal of the ACM, 2008,55(3):1-4.[5]KUHN D R. Mutual exclusion of roles as a means of implementing separation of duty in role based access control systems[C]// Proceedings of 2nd ACM Workshop on Role-Based Access Control.New York:ACM, 1997: 23-30.[6]MOON C J, PARK D H, PARK S J, et al. Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration [J]. Computers and Security,2004, 23(2):126-136.[7]MOON C J,, PAIK W J, KIM Y G, et al. The conflict detection between permission assignment constraints in role-based access control[C]// CISC 2005.Berlin:Springer,2005: 265-278.[8]AHN G J. Role-based authorization constraints specification [J]. ACM Transactions on Information and System Security, 2000, 3(4): 207-226.[9]CHEN HONG, LI NINGHUI. Constraint generation for separation of duty[C]// Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. New York:ACM, 2006:130-138.