共 25 条
[1]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[2]
[Anonymous], 1992, 15 NAT COMP SEC C
[3]
[Anonymous], 2013, EFF INC MAN INS SEC
[4]
Enhanced Role-Based Access Control for Cloud Security
[J].
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1,
2015, 324
:837-852
[5]
Cao J, 2005, 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, P719
[6]
Chang Chin-Chen, 2004, P 18 INT C ADV INF N, V2, P123
[7]
A Role-based RSA Key Management Approach in a Hierarchy Scheme
[J].
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS),
2014,
:258-264
[8]
Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments
[J].
2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008),
2008,
:491-498
[10]
DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P120