共 50 条
- [1] Trusted Access Control Model Based on Role and Task in Cloud Computing 2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
- [2] Access control security model based on dual identity authentication in cloud computing environment Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 288 - 292
- [5] Profile Based Access Control Model in Cloud Computing Environment 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
- [6] Defending of Trusted Access Control in Cloud Computing INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
- [7] Data Security Access Control Model of Cloud Computing 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
- [8] An Enhanced Access Control Model Based on Trusted Computing PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 920 - 928
- [9] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
- [10] Research on ATN-based trusted cloud computing security model Journal of Information and Computational Science, 2012, 9 (18): : 5945 - 5952