共 11 条
[1]
COLOMBO M, 2009, 2009 IEEE INT WORKSH
[2]
DAMIANI ML, 2008, FTDCS 08, P199
[3]
FENG J, 2007, IEEE ACM INT WORKSH, P66
[4]
Hafner M, 2008, LECT NOTES COMPUT SC, V5002, P132
[5]
Katt B, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P123
[6]
MARTINELLI F, 2005, P INT C AUT AUT SYST, P82
[7]
NAQVI S, 2008, SERVICEWAVE 08, P242
[8]
Park J., 2004, ACM Transactions on Information and Systems Security, V7, P128, DOI 10.1145/984334.984339
[9]
PARK J, 2002, SACMAT 02, P57, DOI DOI 10.1145/507711.507722
[10]
[张新娟 ZHANG Xinjuan], 2008, [扬州大学学报. 自然科学版, Journal of Yangzhou University], V11, P1