共 21 条
[1]
[Anonymous], P 2014 INT C INF COM
[3]
Chakraborty S., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P49
[4]
Chen L., 2008, P 2008 ACM S INF COM, P20
[5]
Choi JH, 2010, J INF SCI ENG, V26, P1801
[6]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[7]
Cloudsim: simulator for cloud computing infrastructure and modeling
[J].
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING,
2012, 38
:3566-3572
[8]
Griffiths TL, 2008, CAMB HANDB PSYCHOL, P59
[9]
Jang EY, 2010, INFORMATION-TOKYO, V13, P1653