共 50 条
- [3] Spy: A method to secure clients for network services [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 23 - 28
- [4] Secure communication and access control for web services container [J]. GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, : 412 - +
- [5] A Method to Secure Data on Web Database with Web Services [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 1181 - 1187
- [6] Authorization and access control to secure web services in a grid infrastructure [J]. WEBIST 2006: Proceedings of the Second International Conference on Web Information Systems and Technologies: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 264 - 267
- [8] A secure data interaction method based on edge computing [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
- [9] Application of chaos control method in secure communication [J]. Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 443 - 446
- [10] A rhythm-based access control system for secure wellness services [J]. The Journal of Supercomputing, 2016, 72 : 2860 - 2873