相似文献/References:
[1]李秋敬 刘广亮 谢圣献 张沙沙 段海霞 许宏伟.基于时间约束的角色访问控制模型研究[J].计算机技术与发展,2009,(08):162.
LI Qiu-jing,LIU Gang-liang,XIE Sheng-xian,et al.Temporal Role- Based Access Control Model[J].,2009,(06):162.
[2]杨晶 张永胜 孙翠翠 王莹.基于时间约束和上下文的访问控制模型研究[J].计算机技术与发展,2011,(01):143.
YANG Jing,ZHANG Yong-sheng,SUN Cui-cui,et al.Access Control Model Based on Time-constraint and Context[J].,2011,(06):143.
[3]黄静 陈震 危水根 王凌.RBAC模型在B/S医院信息系统中的应用[J].计算机技术与发展,2011,(06):246.
HUANG Jing,CHEN Zhen,WEI Shui-gen,et al.Application of Role-Based Access Control Model in B/S Hospital Information System[J].,2011,(06):246.
[4]黄妮 吴晓军.基于时间约束的软件工程资源配置Petri网检测模型[J].计算机技术与发展,2012,(04):21.
HUANG Ni,WU xiao-jun.Petri Net Detecting Model of Software Engineering Resource Configuration Based on Time Constraint[J].,2012,(06):21.
[5]袁文礼 陈平华 熊建斌.扩展的RBAC模型在数据共享服务平台中的应用[J].计算机技术与发展,2012,(08):221.
YUAN Wen-li,CHEN Ping-hua,XIONG Jian-bin.Application of Extended Role-based Access Control Model in Data Sharing Service Platform[J].,2012,(06):221.
[6]许洁,葛家宏,牛光辉,等.一种RBAC的改进方案在文件共享系统中的实现[J].计算机技术与发展,2013,(09):123.
XU Jie[],GE Jia-hong[],NIU Guang-hui[],et al.Realization of Improved RBAC Model in File-sharing System[J].,2013,(06):123.
[7]邓海生,刘啸,李军怀,等.基于时间约束的隐私保护数据查询方法研究[J].计算机技术与发展,2013,(10):119.
DENG Hai-sheng[],LIU Xiao[],LI Jun-huai[],et al.Research on Privacy Preserving Data Query Method Based on Time-constrained[J].,2013,(06):119.
[8]张玉静,刘军,李先珠. 带有时间约束支持冲突检测的访问控制模型[J].计算机技术与发展,2015,25(02):117.
ZHANG Yu-jing,LIU Jun,LI Xian-zhu. An Access Control Model of Supporting Conflict Detection with Time Constrains[J].,2015,25(06):117.
[9]金仙力,李金刚.基于遗传算法的多目标路径优化算法的研究[J].计算机技术与发展,2018,28(02):54.[doi:10.3969/j.issn.1673-629X.2018.02.013]
JIN Xianli,LI Jingang.Research on Multi-target Path Optimization Algorithm Based on Genetic Algorithm[J].,2018,28(06):54.[doi:10.3969/j.issn.1673-629X.2018.02.013]