共 51 条
[1]
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems
[J].
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019),
2019,
[2]
Andreeva O., 2017, Industrial control systems and their online availability
[3]
Barnum S., 2012, MITRE CORPORATION, V11, P1
[5]
Usage Control on Cloud systems
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 63
:37-55
[6]
Colombo A., 2014, Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach
[7]
A Proposal on Enhancing XACML with Continuous Usage Control Features
[J].
GRIDS, P2P AND SERVICES COMPUTING,
2010,
:133-+
[8]
Drias Z., 2015, International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), P1, DOI [10.1109/SSIC.2015.7245330, DOI 10.1109/SSIC.2015.7245330]
[9]
Easttom C., 2019, Computer security fundamentals
[10]
Hong HJ, 2017, IEEE INT SYM BROADB, P13