共 26 条
[2]
Atluri V., 1996, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, P44
[3]
Benantar M., 2006, ACCESS CONTROL SYSTE
[4]
BERTINO E, 1999, ACM T INFORM SYST SE, V2, P65, DOI DOI 10.1145/300830.300837
[5]
Chandran SM, 2005, LECT NOTES COMPUT SC, V3806, P361
[6]
Damiani M. L., 2007, International Journal of Information and Computer Security, V1, P5, DOI 10.1504/IJICS.2007.012243
[7]
Supporting mobile business workflow with Commune
[J].
SEVENTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, PROCEEDINGS,
2006,
:10-15
[8]
Decker M., 2008, P INT C MOB BUS ICMB
[9]
Denning D. E., 1996, Computer Fraud & Security, P12, DOI 10.1016/S1361-3723(97)82613-9
[10]
DENNING DE, 1979, COMPUT SURV, V11, P227, DOI 10.1145/356778.356782