共 15 条
- [2] [Anonymous], 1999, RFC 2560
- [4] Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
- [5] Chen R., 2002, POBLANO DISTRIBUTED
- [6] Cooper D., 2008, Technical report, DOI 10.17487/rfc5280
- [7] Elmisery AM, 2011, J CONVERGENCE, V2, P33
- [8] Gao Ying, 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), P574, DOI 10.1109/ICCSIT.2009.5234627
- [9] Modeling group trust for peer-to-peer access control [J]. 15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 971 - 978
- [10] Theoretical Analysis of Issuing Mechanism in Distributive Digital Certificate Revocation List [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 199 - +