共 126 条
[61]
Jang J., 2011, TURSTCOM 2011, P436
[62]
Federated Identity Management Challenges
[J].
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES),
2012,
:230-235
[63]
Johnson M., 2012, P SOUPS 2012
[64]
Kanich C, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P3
[68]
Kordy B, 2012, LECT NOTES COMPUT SC, V7053, P103, DOI 10.1007/978-3-642-25261-7_8
[69]
Lampson B, 2009, COMMUN ACM, V52, P25, DOI [10.1145/1592761.1592773, 10.1145/15.92761.1592773]
[70]
Leandro MarcosA. P., 2012, 11 INT C NETWORKS, P88