共 49 条
[31]
McGraw R., 2009, PRIV ACC MAN WORKSH
[32]
Moraglio A., 2012, LECT NOTES COMPUTER, V7244
[33]
Ni Q., 2010, P 5 ACM S INFORM COM, P250, DOI 10.1145/1755688.1755719
[34]
OASIS Standard, 2013, EXT ACC CONTR MARK L
[35]
Business-driven management of infrastructure-level risks in Cloud providers
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2014, 32
:41-53
[36]
Orwat M.E., 2008, THESIS NAVAL POSTGRA
[37]
Pina Ros S., 2012, Proceedings of the 2012 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, USA, June 20-22, 2012, P83
[38]
Qian J, 2001, INT FED INFO PROC, V64, P197
[39]
Ray I., 2014, HIGH PERFORMANCE CLO, P189
[40]
Rehman S.U., 2012, INT J COMPUT SCI ISS, V9, P96