共 17 条
- [1] Anh D.T. T., 2014, Proceedings of the 4th ACM conference on Data and application security and privacy, P13, DOI DOI 10.1145/2557547.2557556
- [2] [Anonymous], 2000, Proceedings of the 33rd Hawaii International Conference on System Sciences, DOI DOI 10.1109/HICCS.2000.926814
- [3] Attribute Based Access Control for APIs in Spring Security [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 85 - 88
- [4] Bellarc M, 2009, LECT NOTES COMPUT SC, V5867, P295, DOI 10.1007/978-3-642-05445-7_19
- [5] Chen JW, 2014, IEEE ICC, P3782, DOI 10.1109/ICC.2014.6883910
- [6] CORAS, 2000, IST200025031 CORAS
- [7] Hajny J, 2014, LECT NOTES COMPUTER, V8639, P1
- [8] Friendships and adaptation in the life course [J]. PSYCHOLOGICAL BULLETIN, 1997, 121 (03) : 355 - 370
- [9] Khan A. N., 2014, J SUPERCOMPUTING
- [10] Kirkham Tom, PERSONAL DATA STORE