共 169 条
[11]
Asaf Z, 2014, 2014 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS AND TECHNOLOGIES (ICOSST), P197, DOI 10.1109/ICOSST.2014.7029344
[12]
Asmaa K, 2016, INT J ADV COMPUT SC, V7, P1
[13]
Atlam Hany F., 2018, International Journal of Computer Network and Information Security, V10, P26, DOI 10.5815/ijcnis.2018.01.04
[15]
Developing an adaptive Risk-based access control model for the Internet of Things
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA),
2017,
:655-661
[16]
Babu Rajeshwari Gadathas Krishna, 2023, 2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN), P672, DOI 10.1109/ICUFN57995.2023.10199371
[17]
Access control in distributed systems
[J].
COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM,
2004,
:21-28
[18]
Barkley J., 1997, P 2 ACM WORKSH ROL B, P127, DOI [10.1145/266741.266769, DOI 10.1145/266741.266769]
[19]
Bashir SR, 2024, Arxiv, DOI arXiv:2401.11305
[20]
Basnet R., 2019, Integration of task-attribute based access control model for mobile workflow authorization and management