共 59 条
[1]
Akyildiz I(2002)A survey on sensor networks IEEE Communications Magazine 40 102-114
[2]
Su W(2010)The internet of things: A survey Computer Networks 54 2787-2805
[3]
Sankarasubramaniam Y(2009)Persona: An online social network with user-defined privacy SIGCOMM Computer Communication Review 39 135-146
[4]
Cayirci E(2008)Modeling contextual security policies International Journal of Information Security 7 285-305
[5]
Atzori L(2003)The many faces of publish/subscribe ACM Computing Surveys 35 114-131
[6]
Iera A(2001)Proposed NIST standard for role-based access control ACM Transactions on Information and System Security 4 224-274
[7]
Morabito G(2013)Free global ID against collusion attack on multi-authority attribute-based encryption Security and Communication Networks 6 1143-1152
[8]
Baden R(2009)ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks Ad Hoc Networks 7 1526-1535
[9]
Bender A(2009)Security architecture for virtual organizations of business web services Journal of Systems Architecture 55 224-232
[10]
Spring N(2008)Taking the “long view” on the Fourth Amendment: Stored records and the sanctity of the home Stanford Technology Law Review 3 1-13