共 17 条
- [1] Cloud Computing
- [2] Li F., Shi G., Ma J., Et al., Research status and development trends of access control model, Acta Electronica Sinica, 40, 4, pp. 805-813, (2012)
- [3] Han D., Gao J., Zhai H., Et al., Research progress on the access control model, Journal of Computer Science, 37, 11, pp. 29-33, (2010)
- [4] Ferraiolo D.F., Sandhu R., Gavrila S., Et al., Proposed NIST standard for role-based access control, ACM Trans on Information and System Security, 4, 3, pp. 224-274, (2001)
- [5] Tan X., Research on access control model in cloud computing environment, pp. 35-41, (2011)
- [6] Zhao M., Yao Z., Cloud computing access control model based on RBAC, Journal of Computer Applications, 32, S2, pp. 267-270, (2012)
- [7] Tan Z., Tang Z., Li R., Et al., Research on trust-based access control model in cloud computing, Proceedings of IEEE Joint International Information Technology and Artificial Intelligence Conference, pp. 339-344, (2011)
- [8] Lin G., He S., Huang H., Et al., The cloud computing access control model based on behavior security model, Journal of Communication, 33, 3, pp. 59-66, (2012)
- [9] Li J., Huai J., Li X., Research on automated trust negotiation, Journal of Software, 17, 1, pp. 124-133, (2006)
- [10] Zhang X., Li Y., Nalla D., An attribute-based access matrix model, Proc of 2005 ACM Symposium on Applied Computing, pp. 359-363, (2005)