共 29 条
- [1] Almeling D.S., 2010, GONZAGA LAW R, V45, P291
- [2] [Anonymous], 2014, DIST RBAC EVAL A PLA
- [3] Banerjee Preeta M., 2014, DELOITTE REV
- [4] Binkert Nathan, 2011, Computer Architecture News, V39, P1, DOI 10.1145/2024716.2024718
- [5] Bloom G., 2013, THESIS G WASHINGTON
- [6] Bloom G, 2012, EMSOFT '12: PROCEEDINGS OF THE TENTH AMC INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE 2012, P133
- [7] Borders K., 2005, Proceedings of the 12th ACM conference on Computer and communications security, P147, DOI [10.1145/1102120.1102142, DOI 10.1145/1102120.1102142]
- [8] Boyle Jim, 2000, 2748 IETF
- [9] Breslau L, 1999, IEEE INFOCOM SER, P126, DOI 10.1109/INFCOM.1999.749260
- [10] Chandra Ramesh., 2010, Proceedings of the 2010 USENIX Conference on Web Application Development, WebApps'10, P1, DOI DOI 10.1109/IPDPSW.2010.5470740