共 17 条
[1]
[Anonymous], 2004, Proceedings of the 2004 ACM Symposium on Applied Computing, SAC'04
[2]
[Anonymous], 2013, J WIRELESS COMMUNICA
[3]
[Anonymous], 2014, NIST SPECIAL PUBLICA
[4]
Bartoli A, 2014, LECT NOTES COMPUT SC, V8672, P394
[5]
Bleuler S, 2001, IEEE C EVOL COMPUTAT, P536, DOI 10.1109/CEC.2001.934438
[6]
Brucker AD, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P197, DOI 10.1145/1542207.1542239
[8]
Ferrari E., 2010, SYNTHESIS LECT DATA
[10]
Gal-Oz Nurit, 2011, Trust, Privacy and Security in Digital Business. Proceedings 8th International Conference (TrustBus 2011), P125, DOI 10.1007/978-3-642-22890-2_11