共 50 条
[31]
Access Control and Security Properties Requirements Specification for Clouds' SecLAs
[J].
2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1,
2013,
:723-729
[32]
Security protection scheme using mobile trusted module and mandatory access control
[J].
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition),
2011, 41 (03)
:513-517
[33]
Using Petri nets to verify access policies in mandatory access control model
[J].
PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004),
2004,
:271-276
[37]
Ontology-based access control model for security policy reasoning in cloud computing
[J].
The Journal of Supercomputing,
2014, 67
:711-722
[40]
CAMAC: A Context-A ware Mandatory Access Control Model
[J].
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY,
2009, 1 (01)
:35-54