共 100 条
[31]
Ferber J, 2004, LECT NOTES COMPUT SC, V2935, P214
[32]
Ferraiolo D. E., 1995, Proceedings. 11th Annual Computer Security Applications Conference, P241
[33]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[34]
Ferraiolo D.F., 1992, 15 NATL COMPUTER SEC, P554
[35]
COMPUTER-SYSTEMS AND THE DESIGN OF ORGANIZATIONAL INTERACTION
[J].
ACM TRANSACTIONS ON OFFICE INFORMATION SYSTEMS,
1988, 6 (02)
:153-172
[36]
GENILLOUD G, P 4 INT ENT DISTR OB, P76
[38]
GREENBERG S, P EUR C COMP SUPP CO, P17
[39]
Exploiting the information Web
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2007, 37 (01)
:109-125
[40]
Guarino N., 1992, Data & Knowledge Engineering, V8, P249, DOI 10.1016/0169-023X(92)90025-7