共 50 条
[21]
Delegation in Predicate Encryption Supporting Disjunctive Queries
[J].
SECURITY AND PRIVACY - SILVER LININGS IN THE CLOUD,
2010, 330
:229-240
[22]
A Secure Proxy Signature Scheme with Delegation by Warrant
[J].
STUDIES IN INFORMATICS AND CONTROL,
2011, 20 (04)
:373-380
[24]
On Supporting Secure Information Distribution in Heterogeneous Systems Using Standard Technologies
[J].
Wireless Personal Communications,
2014, 76
:99-119
[25]
A coordinator for workflow management systems with information access control
[J].
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS,
2005, E88D (12)
:2786-2792
[26]
A Review of Delegation and Break-Glass Models for Flexible Access Control Management
[J].
BUSINESS INFORMATION SYSTEMS WORKSHOPS (BIS 2014),
2014, 183
:93-104
[27]
A Discretionary Delegation Framework for Access Control Systems
[J].
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES,
2016, 10033
:865-882
[28]
Design and implementation of a secure and flexible access-right delegation for resource constrained environments
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 99
:593-608
[29]
Design of PMI supporting self-administrative sub-role based delegation
[J].
IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II,
2007,
:1356-+