共 25 条
[1]
Ardagna ClaudioA., 2006, Proceedings of the 2006 ACM Symposium on Information, computer and communications security, ASIACCS '06, P212
[2]
Cirani S., 2015, SCI INT J PARALLEL D, V14, P249
[3]
An Approach to Supporting Continuity of Usage in Location-based Access Control
[J].
12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2008,
:199-+
[5]
Feltus C., 2010, Business/IT Alignment and Interoperability BUSITAL 2010, P61
[6]
Gomez L, 2014, LECT NOTES COMPUT SC, V8842, P108, DOI 10.1007/978-3-662-45550-0_15
[7]
Karopoulos G., 2012, Proceedings of the 2012 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2012), P283, DOI 10.1109/PDP.2012.81
[9]
Katt B, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P123
[10]
Kulkarni D, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P113