共 51 条
[1]
Abdunabi R, 2013, IEEE SYST J IN PRESS
[2]
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[3]
Ahn GJ, 2001, PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, P157, DOI 10.1109/ENABL.2001.953406
[4]
Aich S, 2007, LECT NOTES COMPUT SC, V4804, P1567
[5]
Aich S, 2009, LECT NOTES COMPUT SC, V5430, P177, DOI 10.1007/978-3-642-01004-0_10
[6]
ANDERSON A., 2004, OASIS ACCESS CONTROL, P13
[7]
[Anonymous], 2005, ADDISON WESLEY OBJEC
[8]
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[9]
Bertino Elisa., 2005, SACMAT 05, P29
[10]
Bose B., 2010, ICWET, P518