共 12 条
- [1] Chandran SM, 2005, LECT NOTES COMPUT SC, V3806, P361
- [2] Context-based access control management in ubiquitous environments [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 253 - 260
- [3] Context-Aware Access Control for RDF Graph Stores [J]. 20TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI 2012), 2012, 242 : 282 - 287
- [5] Semantics-based Access Control Approach for Web Service [J]. JOURNAL OF COMPUTERS, 2011, 6 (06) : 1152 - 1161
- [6] Hulsebosch R.J., 2005, Proceedings of the 10th ACM symposium on Access Control Models and Technologies, SACMAT '05, P111, DOI DOI 10.1145/1063979.1064000
- [7] Kayes A. S. M., 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P442, DOI 10.1007/978-3-642-31448-3_34
- [8] Kulkarni D, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P113