共 72 条
- [1] Agreiter B, 2007, SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, P18
- [2] Alam M., 2008, P 2008 ACM S INF COM, V8, P245
- [3] Alam M, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P175
- [4] A survey of trust in computer science and the Semantic Web [J]. JOURNAL OF WEB SEMANTICS, 2007, 5 (02): : 58 - 71
- [5] Baiardi F, 2004, LECT NOTES COMPUT SC, V3292, P123
- [6] Barka E., 2008, Journal of Computer Systems, Networks, and Communications, V2008, DOI 10.1155/2008/380468
- [7] Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
- [8] Bettini C., 2002, POLICY 02
- [9] Access control: principles and solutions [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05) : 397 - 421
- [10] Ding Y., 2008, ADV SOFTWARE ENG ITS, P182, DOI DOI 10.1109/ASEA.2008.14