共 50 条
- [31] Classifying and Comparing Attribute-Based and Relationship-Based Access Control PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 59 - 70
- [32] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
- [33] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
- [34] Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5533 - 5543
- [36] Attribute-based Mining Process for the Organization-Based Access Control Model 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 421 - 430
- [37] A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 614 - 623
- [38] HoBAC: toward a Higher-order Attribute-Based Access Control Model 16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 303 - 310
- [40] Attribute-Based Access Control in Service Mesh 2019 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2019,