共 106 条
[1]
A model for attribute-based user-role assignment
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:353-362
[2]
[Anonymous], 2019, SECURITY REQUIREMENT
[3]
[Anonymous], 2003, ITU-T: X.805
[4]
[Anonymous], 2017, 5G PPP ARCHITECTURE WORKING GROUP
[5]
[Anonymous], 2009, Security in Telecommunications and Information Technology: An overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications
[6]
[Anonymous], 2020, Security Considerations for Quantum Key Distribution Network
[7]
[Anonymous], 2020, COMPL COH PLATF APPR
[8]
Atlam Hany F., 2018, International Journal of Computer Network and Information Security, V10, P26, DOI 10.5815/ijcnis.2018.01.04
[9]
CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
[J].
IEEE ACCESS,
2017, 5
:17678-17691