共 10 条
[1]
Benton K., 2013, 5 INT WORKSH SECURIT
[2]
An extensible XACML authorization decision engine for context aware applications
[J].
JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING,
2009,
:377-382
[4]
Huabo Li, 2011, Proceedings of the 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC 2011), P529, DOI 10.1109/IMCCC.2011.137
[5]
Loscocco P, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, P29
[6]
Lyle J., 2012, 2012 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY 2012, P37, DOI 10.1109/POLICY.2012.9
[7]
Mohan A., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10, P37, DOI DOI 10.1145/1750389.1750395
[8]
Nauman M., 2010, PROC 5 ACM S INF COM, P328, DOI DOI 10.1145/1755688.1755732
[10]
Yahyaoui H., 2010, 2010 Fifth International Conference on Digital Information Management (ICDIM 2010), P496, DOI 10.1109/ICDIM.2010.5664644