共 25 条
[1]
Agarwal V., 2012, CLOUD COMPUTING HIGH
[2]
[Anonymous], 2012, INT J SOFT COMPUTING
[3]
[Anonymous], 2012, P 7 INT C INT MON PR
[4]
Armbrust Michael, 2009, University of California, Berkeley, DOI DOI 10.1145/1721654.1721672
[5]
Ausanka-Crues R., 2001, METHODS ACCESS CONTR, DOI 10.1.1.596.2814.
[7]
Chen DW, 2009, LECT NOTES COMPUT SC, V5931, P559, DOI 10.1007/978-3-642-10665-1_52
[8]
Modeling and Verifying NDN Access Control Using CSP
[J].
FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018,
2018, 11232
:143-159
[9]
Ferraiolo D. F., ARXIV09032171ACCR
[10]
Hoare C.A.R., 1985, Communicating Sequential Processes