共 16 条
- [1] Bertolissi C, 2008, CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, P1, DOI 10.1109/CRISIS.2008.4757458
- [2] Birget JC, 2001, 2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, P229, DOI 10.1109/ICC.2001.936308
- [3] Analysis and Design of an Access Control Model Based on Credibility [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 312 - +
- [4] Demchenko Yuri, 2006, P 2 IEEE INT C E SCI
- [5] A Trust and Context Based Access Control Model for Distributed Systems [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 629 - +
- [6] Gunjan Kumar, 2012, INT J ENG RES TECHNO, V1
- [7] Krawczyk Henryk, 2010, P 2 INT C INF TECHN, P121
- [8] Lang Bo, 2007, P 2 INT C PERV COMP
- [9] Lingli Zhao, 2010, 2010 2nd Conference on Environmental Science and Information Application Technology (ESIAT 2010), P548, DOI 10.1109/ESIAT.2010.5568874
- [10] Pereira A. L., 2011, 2011 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, P914, DOI 10.1109/IPDPS.2011.237