共 21 条
[1]
Swamy N., Hicks M., Verified Enforcement of Security Policies for Cross-Domain
[2]
Irvine C.E., Et al., MYSEA: The Monterey security architecture, Proc. Of the Workshop on Scalable Trusted Computing (ACM STC), Conference on Computer and Communications Security (CCS), pp. 39-48, (2009)
[3]
Atighetchi M., Et al., XDDS: A Salable Guard-Agnostic Cross Domain Discovery Service
[4]
Web Services Architecture
[5]
Shader M., Cross-Domain Application Architecture: The Need for an End-to-End Approach, (2012)
[6]
Fielding R., Architectural styles and the design of network-based software architectures, (2000)
[7]
IC/DoD Content Discovery and Retrieval Reference Architecture, (2011)
[8]
Universal Description, Discovery and Integration, (2005)
[9]
Kim A., Luo J., Kang M., Security ontology for annotating resources, OTM 2005. LNCS, 3761, pp. 1483-1499., (2005)
[10]
Denker G., Kagal L., Finin T., Security in the Semantic Web using OWL, Information Security Technical Report, 10, 1, pp. 51-58, (2005)