共 13 条
[1]
[Anonymous], 2005, P 10 S ACCESS CONTRO
[2]
Chakraborty S., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P49
[3]
A context-aware security architecture for emerging applications
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:249-258
[4]
COVINGTON MJ, 2000, P 23 NAT INF SYST SE
[5]
Covington MJ, 2001, P 6 ACM S ACC CONTR, P10
[6]
Gambetta D., 1998, TRUST MAKING BREAKIN
[7]
GROBA C, 2007, P 2 INT C AV REL SEC
[8]
Design of a role-based trust-management framework
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:114-130
[9]
LIAN Q, 2006, P 5 INT WORKSH PEER
[10]
Sandhu R, 2005, P 10 ACM S ACC CONTR, P147