共 19 条
[1]
[Anonymous], The OAuth 2.0 Authorization Framework, DOI DOI 10.17487/RFC6749
[2]
[Anonymous], 2005, P IEEE INT C WEB SER
[3]
[Anonymous], 2003, Proceedings of the 2003 ACM workshop on XML security
[4]
An End-to-End Security Auditing Approach for Service Oriented Architectures
[J].
2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012),
2012,
:279-284
[5]
Ben Othmane Lotfi, 2009, Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business. CONGRESS 2009, P202, DOI 10.1109/CONGRESS.2009.30
[6]
Cantor S., 2005, Protocols and Profiles, V10, P16
[7]
Self Protecting Data Sharing using Generic Policies
[J].
2015 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING,
2015,
:1197-1200
[8]
Cockcroft A., Netflix cloud architecture
[9]
Fernando R., 2016, P IEEE C CLOUD COMP