共 28 条
[1]
[Anonymous], INT J ADV INTELLIGEN
[2]
Bourimi M., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P1364, DOI 10.1109/PASSAT/SocialCom.2011.49
[7]
Cloud identity management security issues & solutions: a taxonomy
[J].
COMPLEX ADAPTIVE SYSTEMS MODELING,
2014, 2
[8]
Kainda R., 2010, SECURITY USABILITY A
[9]
Mayer P, 2014, LECT NOTES COMPUT SC, V8880, P204, DOI 10.1007/978-3-319-13841-1_12
[10]
Mihajlov M., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P332, DOI 10.1109/ICNSS.2011.6060025