共 10 条
- [1] [Anonymous], 2003, EXTENSIBLE ACC CONTR, P4
- [2] Dai CY, 2010, 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), P85
- [3] Park J., 2004, ACM Transactions on Information and Systems Security, V7, P128, DOI 10.1145/984334.984339
- [4] Originator control in usage control [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 60 - 66
- [5] Security architectures for controlled digital information dissemination [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 224 - 233
- [6] Park J., 2002, P 7 ACM S ACCESS CON, P57, DOI DOI 10.1145/507711.507722
- [8] Xinwen Zhang, 2006, THESIS G MASON U FAI, P3
- [9] Zhang GP, 2009, 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, P821
- [10] Zhang Xinwen, 2006, ACM ASIACCS 06 MARCH