共 43 条
- [1] Al-Nedhami I. M., 2008, P 2 INT WORKSH SERV
- [2] [Anonymous], INT J INFONOMICS
- [3] [Anonymous], 2013, INDIAN J SCI TECHNOL
- [4] [Anonymous], 200502 OASIS
- [5] Carminati B, 2006, ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, P489
- [6] Carroll M., 2011, Secure cloud computing: Benefits, risks and controls, DOI [DOI 10.1109/ISSA.2011.6027519, 10.1109/ISSA.2011.6027519]
- [7] A privacy preserving access control scheme using anonymous identification for ubiquitous environments [J]. 13TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 482 - +
- [8] A Certificate Driven Access Control Strategy for Service Composition and Its Analysis [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1584 - 1591
- [9] A Web Service Privacy Framework Based on a Policy Approach Enhanced with Ontologies [J]. CSE 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2008, : 209 - 214
- [10] Jian Wang, 2009, 2009 International Conference on Test and Measurement (ICTM 2009), P213, DOI 10.1109/ICTM.2009.5413073