共 41 条
- [1] Polisma - A Framework for Learning Attribute-Based Access Control Policies [J]. COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
- [2] Alshehri A, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P530, DOI [10.1109/CIC.2016.081, 10.1109/CIC.2016.79]
- [3] IoT Security A Comprehensive Life Cycle Framework [J]. 2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 196 - 203
- [4] Convergent Access Control to Enable Secure Smart Communities [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 148 - 156
- [5] Bouij-Pasquier I, 2015, I C COMP SYST APPLIC
- [6] IoTGUARD: Dynamic Enforcement of Security and Safety Policy in Commodity IoT [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
- [7] Data Access Model for Privacy-Preserving Cloud-IoT Architectures [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 191 - 202
- [8] Access Control Model for Google Cloud IoT [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 198 - 208
- [9] Gupta M, 2021, Arxiv, DOI arXiv:2101.03736