Citation: | Zhai Zhengde, Xu Zhen, and Feng Dengguo. Violation of Static Mutual Exclusive Role Constraints in Dynamic Role Transition[J]. Journal of Computer Research and Development, 2008, 45(4): 677-683. |
[1] | Yu Tingting, Li Chao, Wang Boxiang, Chen Rui, Jiang Yunsong. Atomicity Violation Detection for Interrupt-Driven Aerospace Embedded Software[J]. Journal of Computer Research and Development, 2023, 60(2): 294-310. DOI: 10.7544/issn1000-1239.202220908 |
[2] | Zhai Zhigang, Wang Jiandong, Cao Zining, Mao Yuguang. Hybrid Role Mining Methods with Minimal Perturbation[J]. Journal of Computer Research and Development, 2013, 50(5): 951-960. |
[3] | Ma Yuchi, Yang Ning, Xie Lin, Li Chuan, and Tang Changjie. Social Roles Discovery of Moving Objects Based on Spatial-Temporal Associated Semantics and Temporal Entropy of Trajectories[J]. Journal of Computer Research and Development, 2012, 49(10): 2153-2160. |
[4] | Liu Meng, Wang Xuan, Huang Hejiao, Zhao Hainan, Zhang Jiajia. A Detection Model Based on Petri Nets of SMER Constraints Violation in Dynamic Role Translation[J]. Journal of Computer Research and Development, 2012, 49(9): 1991-1998. |
[5] | Wang Hongbing, Fan Zhihua, and She Chundong. Dynamic Role Assignment for Multi-Agent System with Parallel Constraints Among Goals[J]. Journal of Computer Research and Development, 2007, 44(4): 693-700. |
[6] | Liao Junguo, Hong Fan, Zhu Xian, Xiao Haijun. Separation of Duty in Dynamic Role Translations Between Administrative Domains[J]. Journal of Computer Research and Development, 2006, 43(6): 1065-1070. |
[7] | Xu Guihong, Zhang Jian. Constraint-Based Termination Analysis of Active Rules[J]. Journal of Computer Research and Development, 2006, 43(5): 894-900. |
[8] | Ji Xiaohui, Zhang Jian. An Efficient and Complete Method for Solving Mixed Constraints[J]. Journal of Computer Research and Development, 2006, 43(3): 551-556. |
[9] | Xing Guanglin and Hong Fan. A Workflow Authorization Model Based on Role and Task and Constraints Specification[J]. Journal of Computer Research and Development, 2005, 42(11): 1946-1953. |
[10] | Long Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(5): 868-876. |