共 15 条
- [1] [Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
- [2] [Anonymous], 2011, P 16 ACM S ACC CONTR
- [3] [Anonymous], NOT 9 CLOUD COMP TOP
- [4] [Anonymous], 2008, INTRO INFORM RETRIEV, DOI DOI 10.1017/CBO9780511809071
- [5] Fuzzy multi-level security : An experiment on quantified risk-adaptive access control - Extended abstract [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 222 - +
- [6] Securing the Cloud-Governance, Risk, and Compliance Issues Reign Supreme [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (06): : 310 - 319
- [9] Jones J., 2006, Norwich J. Inf. Assur, V2, P67
- [10] Keshlaf Ayad Ali, 2010, Proceedings of the Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), P22, DOI 10.1109/ICIMP.2010.12