共 50 条
- [31] Toward a decentralized trust-based access control system for dynamic collaboration [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 317 - 324
- [32] Relationship-Based Access Control for Resharing in Decentralized Online Social Networks [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 : 18 - 34
- [33] Semantics-based access control - Ontologies and feasibility study of policy enforcement function [J]. WEBIST 2007: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL IT: INTERNET TECHNOLOGY, 2007, : 150 - 155
- [34] Specification & Enforcement of Access Control in Information & Communication Systems [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585
- [35] Access control enforcement in Named Data N etworking [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 576 - +
- [36] Access Control Enforcement Architectures for Dynamic Manufacturing Systems [J]. 2023 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE, ICSA, 2023, : 82 - 92
- [37] Checking Policy Enforcement in an Access Control Aspect Model [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2008, 11 (05): : 541 - 552
- [38] Specification and enforcement of access control in heterogeneous distributed applications [J]. WEB SERVICES -ICWS-EUROPE 2003, PROCEEDINGS, 2003, 2853 : 88 - 100
- [39] Access Control for Database Applications: Beyond Policy Enforcement [J]. PROCEEDINGS OF THE 19TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, HOTOS 2023, 2023, : 223 - 230
- [40] Policy-based access control framework for grid computing [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID: SPANNING THE WORLD AND BEYOND, 2006, : 391 - +