共 56 条
[1]
Abowd G. D., 2002, IEEE Pervasive Computing, V1, P48, DOI 10.1109/MPRV.2002.993144
[2]
Abowd GD, 1999, LECT NOTES COMPUT SC, V1707, P304
[3]
[Anonymous], 2001, 6 ACM S ACCESS CONTR
[4]
[Anonymous], 2004, a W3C Recommendation
[5]
[Anonymous], 1994, 1994 1 WORKSH MOB C, DOI [10.1109/WMCSA.1994.16, DOI 10.1109/WMCSA.1994.16]
[6]
[Anonymous], 2011, P 3 ACM SIGPLAN WORK
[7]
Bao YB, 2008, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, P1175, DOI 10.1109/ICYCS.2008.528
[8]
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[9]
Bertino Elisa., 2005, SACMAT 05, P29