共 50 条
[31]
Multi-Level security model in distributed database systems
[J].
PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI,
2022, 28 (02)
:266-276
[32]
Latency, Power, and Security Optimization in Distributed Reconfigurable Embedded Systems
[J].
2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW),
2016,
:124-131
[33]
Application of Security Metrics to Instrument Systems That Use Distributed Processing
[J].
2011 FUTURE OF INSTRUMENTATION INTERNATIONAL WORKSHOP (FIIW),
2011,
[34]
A FORMAL PROTECTION MODEL OF SECURITY IN CENTRALIZED, PARALLEL, AND DISTRIBUTED SYSTEMS
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1990, 8 (03)
:183-213
[35]
Towards Scalable Defense of Information Flow Security for Distributed Systems
[J].
PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19),
2019,
:438-442
[36]
State-dependent security decisions for distributed object systems
[J].
DATABASE AND APPLICATION SECURITY XV,
2002, 87
:105-118
[37]
Role-based security for configurable distributed control systems
[J].
SIXTH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS,
2001,
:111-118
[38]
A Security Approach for Credential-Management in Distributed Heterogeneous Systems
[J].
INTELLIGENT DISTRIBUTED COMPUTING V,
2011, 382
:219-224