共 31 条
[2]
Almutairi S, 2021, INT J ADV COMPUT SC, V12, P339
[3]
Aluvalu RajaniKanth., 2015, Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume, V1, P653, DOI [10.1007/978-3-319-13728-573, DOI 10.1007/978-3-319-13728-573]
[6]
An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things
[J].
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY,
2017,
:254-260
[7]
Badar Nazia., 2013, Automated Security Management, P79, DOI DOI 10.1007/978-3-319-01433-3_5
[8]
Critical Comparison of Access Control Models for Cloud Computing
[J].
JOURNAL OF INTERNET TECHNOLOGY,
2015, 16 (03)
:431-442
[9]
[Беззатеев С.В. Bezzateev S.V.], 2021, [Научно-технический вестник информационных технологий, механики и оптики, Scientific and Technical Journal of Information Technologies, Mechanics and Optics, Nauchno-tekhnicheskii vestnik informatsionnykh tekhnologii, mekhaniki i optiki], V21, P553, DOI 10.17586/2226-1494-2021-21-4-553-561
[10]
Bijon KZ, 2013, IEEE CONF COMM NETW, P462, DOI 10.1109/CNS.2013.6682761