共 77 条
[11]
Baase S., 2008, A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd Edition, V3rd
[12]
Bahramipanah Maryam, 2016, 2016 Power Systems Computation Conference (PSCC), P1, DOI 10.1109/PSCC.2016.7540862
[15]
Betgé-Brezetz S, 2013, IEEE INT CONF CL NET, P25, DOI 10.1109/CloudNet.2013.6710554
[16]
Bezzi M, 2011, DATA USAGE CONTROL F
[17]
Birnhack Michael D., 2008, Computer Law and Security Report, V24, P508, DOI 10.1016/j.clsr.2008.09.001
[18]
Brandic Ivona, 2010, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD 2010), P244, DOI 10.1109/CLOUD.2010.42
[19]
Distributed Enforcement of Sticky Policies with Flexible Trust
[J].
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS),
2015,
:1202-1209
[20]
Bull G., 2001, Computer Law and Security Report, V17, P239, DOI 10.1016/S0267-3649(01)00705-1