共 167 条
[1]
Abadi M(2017)The applied pi calculus: mobile values, new names, and secure communication J. ACM (JACM) 65 1-41
[2]
Blanchet B(2017)An attribute based access control framework for healthcare system J. Phys. Conf. Ser. 933 1-15
[3]
Fournet C(2019)eHealth cloud security challenges: a survey J. Healthc. Eng. 2019 191-233
[4]
Afshar M(2001)TRBAC: a temporal role-based access control model ACM Trans. Inf. Syst. Security (TISSEC) 4 3-51
[5]
Samet S(2008)Automated verification of selected equivalences for security protocols J. Logic Algebraic Program. 75 48-37
[6]
Hu T(2017)PRESAGE: privacy-preserving genetic testing via software guard extension BMC Med. Genom. 10 28-633
[7]
Al-Issa Y(2020)Sgxpectre: stealing intel secrets from SGX enclaves via speculative execution IEEE Secur. Priv. 18 620-191
[8]
Ottom MA(2019)A comparative analysis of emerging approaches for securing java software with Intel SGX Futur. Gener. Comput. Syst. 97 171-833
[9]
Tamrawi A(2018)CacheQuote: efficiently recovering long-term secrets of SGX EPID via cache attacks IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018 798-335
[10]
Bertino E(2006)Kleene algebra with domain ACM Trans. Comput. Logic (TOCL) 7 311-47