共 25 条
[2]
Al-Zewairi M., 2011, PRIVACY SECURITY RFI, P272
[3]
Overriding of access control in XACML
[J].
EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS,
2007,
:87-+
[5]
Benssalah M, 2014, SECURITY COMM N 0101
[6]
Bijon KZ, 2013, IEEE CONF COMM NETW, P462, DOI 10.1109/CNS.2013.6682761
[7]
Chen C., 2010, 2010 14 INT C COMP S, P110, DOI [10.1109/CSCWD.2010, DOI 10.1109/CSCWD.2010]
[8]
Cheng X., 2013, CIRCUITS SYS INPRESS, P1, DOI DOI 10.1039/X0XX00000X
[9]
Cole P.H., 2008, Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
[10]
Han S, 2007, LECT NOTES COMPUT SC, V4864, P623