共 25 条
[2]
Al-Zewairi M., 2011, 2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), P272, DOI [DOI 10.1109/AEECT.2011, 10.1109/AEECT.2011.6132520, DOI 10.1109/AEECT.2011.6132520]
[3]
Al-Zewairi M., 2017, ACIT 2017 INT AR C I
[4]
Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System
[J].
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC),
2016,
:1-7
[7]
Overriding of access control in XACML
[J].
EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS,
2007,
:87-+
[8]
[Anonymous], 2014, INT J COMPUTER APPL, DOI DOI 10.5120/18758-0028
[10]
Chen C., 2010, 2010 14 INT C COMP S, P110, DOI [10.1109/CSCWD.2010, DOI 10.1109/CSCWD.2010]