共 51 条
[1]
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems
[J].
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019),
2019,
[2]
Andreeva O., 2019, RESEARCHGATE, DOI 10.13140/RG.2.2.15858.66241
[3]
Barnum Sean., 2012, Mitre Corporation, V11, P1
[5]
Usage Control on Cloud systems
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 63
:37-55
[6]
Colombo A., 2014, Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach
[7]
A Proposal on Enhancing XACML with Continuous Usage Control Features
[J].
GRIDS, P2P AND SERVICES COMPUTING,
2010,
:133-+
[8]
Drias Z., 2015, 2015 International Conference on Protocol Engineering, P1, DOI DOI 10.1109/NOTERE.2015.7293513
[9]
Easttom C., 2019, Computer security fundamentals
[10]
Hong HJ, 2017, IEEE INT SYM BROADB, P13