共 13 条
[1]
Ahmed Ali, 2010, Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), P251, DOI 10.1109/SECURWARE.2010.48
[2]
AlZain M. A., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P5490, DOI 10.1109/HICSS.2012.153
[4]
Benantar M., 2006, ACCESS CONTROL SYSTE
[5]
Bernabe JB, 2011, SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P333
[6]
Borst W.N., 1999, Construction of engineering ontologies for knowledge sharing and reuse
[7]
Britton David W., 2007, THESIS
[8]
Brucker AD, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P197, DOI 10.1145/1542207.1542239
[9]
Celesti A., 2010, Proceedings of the 2010 Second International Conference on Advances in Future Internet (AFIN 2010), P94, DOI 10.1109/AFIN.2010.23
[10]
Celesti Antonio, 2010, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD 2010), P337, DOI 10.1109/CLOUD.2010.46