共 13 条
[1]
[Anonymous], 2012, SECURITY 12
[2]
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[3]
Gao P, 2019, PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), P1772, DOI [10.1109/itaic.2019.8785603, 10.1109/ITAIC.2019.8785603]
[4]
Gilman Evan, 2019, ZERO TRUST NETWORKS, P1
[5]
Hornyack P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P639
[6]
LIU Huan, 2020, COMMUNICATIONS TECHN, V53, P1745
[7]
Establishing a Zero Trust Strategy in Cloud Computing Environment
[J].
2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020),
2020,
:248-+
[10]
Ward Rory, 2017, B BEYER CORP NEW APP