共 17 条
- [1] Developing a model for trust management in pervasive devices [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 267 - +
- [2] Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1616 - +
- [3] Farooqi N., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P764
- [4] Farooqi N., 2011, CS1109 U SHEFF DEP C
- [5] Farooqi N., 2012, WORLD C INT SEC C WO
- [6] Han-fa X., 2010, 2 IITA INT C GEOSC R, P552
- [7] Hitchens M., 2001, LECT NOTE COMPUTER S, V2229, P131
- [8] Lili Sun, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P486, DOI 10.1109/NSS.2010.28
- [9] Lin AZ, 2006, GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, P557
- [10] A trust-based access control with feedback [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514