共 36 条
[1]
Accorsi R, 2011, LECT NOTES COMPUT SC, V6711, P109
[2]
Ali A, 2017, 2017 INTERNATIONAL CONFERENCE ON ENERGY CONSERVATION AND EFFICIENCY (ICECE), P1, DOI 10.1109/ECE.2017.8248819
[3]
MITIS - An Insider Threats Mitigation Framework for Information Systems
[J].
FUTURE DATA AND SECURITY ENGINEERING,
2017, 10646
:407-415
[4]
[Anonymous], 1997, TECHNICAL REPORT
[5]
Distributed Immutabilization of Secure Logs
[J].
SECURITY AND TRUST MANAGEMENT, STM 2016,
2016, 9871
:122-137
[6]
Semantic Logging: Towards Explanation-Aware DAS
[J].
11TH INTERNATIONAL CONFERENCE ON DOCUMENT ANALYSIS AND RECOGNITION (ICDAR 2011),
2011,
:1140-1144
[7]
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
[J].
PROVABLE SECURITY, PROVSEC 2017,
2017, 10592
:87-106
[8]
Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things
[J].
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS,
2017,
:185-192
[9]
HOLT J.E., 2006, 2006 AUSTRALASIAN WO, V54, P203
[10]
Jaquette GA., 2001, US Patent, Patent No. [6,272,086, 6272086]