共 90 条
[51]
Bo JU, Access control policy research progress[J], Audio Engineering, 44, 12, pp. 78-80, (2020)
[52]
VINH P T, LE MINH T., To assign and control the right accessing geo-database by access control cube, Proceedings of 2011 International Conference on Information and Electronics Engineering, pp. 253-257, (2011)
[53]
FATHY M, AZER M, BAHGAT M, Et al., Security access control research trends, Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), pp. 1-6, (2013)
[54]
PAN Ruijie, WANG Gaocai, HUANG Hengyi, Attribute access control based on dynamic user trust in cloud computing[J], Computer Science, 48, 5, pp. 313-319, (2021)
[55]
ZHANG Bin, Research and implementation of Zone-based RBAC model, (2018)
[56]
RAO K R, NAYAK A, RAY I G, Et al., Role recommender-RBAC:Optimizing user-role assignments in RBAC[J], Computer Communications, 166, pp. 140-153, (2021)
[57]
MALIK A K, ALI M A, MATEEN A, Et al., A comparison of collaborative access control models[J], International Journal of Advanced Computer Science and Applications, 8, 3, pp. 290-296, (2017)
[58]
MAO Jian, ZHU Changqing, GUO Jifa, Et al., A threat model and its coping strategies for geospatial data access control[J], Science of Surveying and Mapping, 43, 2, pp. 88-94, (2018)
[59]
MAO Jian, Research on the model of geospatial data access control[D], (2015)
[60]
GAO Minghua, Research on temporal-spatial based access control and privacy protection[D], (2021)