共 23 条
[1]
[Anonymous], J INTERNET SERVICES
[2]
[Anonymous], 2005, 21 ANN COMP SEC APPL
[3]
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[4]
An access control model supporting periodicity constraints and temporal reasoning
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1998, 23 (03)
:231-285
[5]
Bonatti Piero., 2013, ACM SACMAT, P125
[6]
Buyya R, 2010, LECT NOTES COMPUT SC, V6081, P13
[7]
Catuogno L., 2013, P 8 INT C INT TECHN, P393
[8]
Catuogno L, 2008, LECT NOTES COMPUT SC, V5019, P16, DOI 10.1007/978-3-540-79966-5_2
[9]
Catuogno L, 2010, LECT NOTES COMPUT SC, V6033, P245, DOI 10.1007/978-3-642-12368-9_19