共 19 条
[1]
[Anonymous], 2010, IEEE 11 INT WORKSH S
[2]
[Anonymous], THESIS
[3]
Damiani E., 2002, ACM Transactions on Information and Systems Security, V5, P169, DOI 10.1145/505586.505590
[4]
Emami SS, 2010, ISECURE-ISC INT J IN, V2, P47
[5]
[冯登国 Feng Dengguo], 2014, [计算机学报, Chinese Journal of Computers], V37, P246
[6]
Giuseppe D. A., 2015, PRIVACY DESIGN BIG D
[8]
Hulsebosch R.J., 2005, Proceedings of the 10th ACM symposium on Access Control Models and Technologies, SACMAT '05, P111, DOI DOI 10.1145/1063979.1064000
[9]
Using inverted indexing to facilitate composition-oriented semantic service discovery
[J].
Ruan Jian Xue Bao,
2007, 8 (1911-1921)
:1911-1921
[10]
Kudo Michiharu., 2000, P 7 ACM C COMPUTER C, P87