The following publications are possibly variants of this publication:
- A Role and Context Based Access Control Model with UMLYubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu;. Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]
- A Role and Context Based Access Control Model with UMLYubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu;. Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]
- Blockchain-Enabled Next Generation Access ControlYibin Dong, Seong Ki Mun, Yue Wang. blockchain 2022: 319-328 [doi]
- Research on Access Control in Collaborative Process Planning SystemYingying Su, Jianrong Wang, Shuang Liang, Liang Tang, Wanshan Wang. Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on, 1, Nov 2008. [doi]
- Research on Access Control in Collaborative Process Planning SystemYingying Su, Jianrong Wang, Shuang Liang, Liang Tang, Wanshan Wang. Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on, 1, Nov 2008. [doi]
- An Administration Model for RBAC Using Hierarchical StructureJinshuang Li, Guiran Chang;. Security Technology, 2008. SECTECH '08. International Conference on, , Nov 2008. [doi]