共 69 条
- [1] Fang L., Yin L.H., Guo Y.C., Fang B.X., A survey of key technologies in attribute-based access control scheme, Chinese Journal of Computers, 40, 7, pp. 1680-1698, (2017)
- [2] Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E., Role-based access control models, Computer, 29, 2, pp. 38-47, (1996)
- [3] Ferraiolo D.F., Kuhn D.R., Role-based access controls, Computer, 4, 3, pp. 554-563, (1992)
- [4] Moyer M.J., Abamad M., Generalized role-based access control, Proc. of the 21st Int'l Conf. on Distributed Computing Systems, pp. 391-398, (2001)
- [5] Bertino E., Bonatti P.A., Ferrari E., TRBAC: A temporal role-based access control model, ACM Trans. on Information and System Security (TISSEC), 4, 3, pp. 191-233, (2001)
- [6] Yuan E., Tong J., Attributed based access control (ABAC) for Web services, Proc. of the IEEE Int'l Conf. on Web Services, (2005)
- [7] Hemdi M., Deters R., Using REST based protocol to enable ABAC within IoT systems, Proc. of the Information Technology, Electronics and Mobile Communication Conf, pp. 1-7, (2016)
- [8] Han Q., Li J., An authorization management approach in the Internet of things, Journal of Information & Computational Science, 9, 6, pp. 1705-1713, (2012)
- [9] Wu J., Dong M., Ota K., Pei B., A fine-grained cross-domain access control mechanism for social Internet of things, Proc. of the Ubiquitous Intelligence and Computing, pp. 666-671, (2014)
- [10] Ouechtati H., Azzouna N.B., Trust-ABAC towards an access control system for the Internet of things, Proc. of the Int'l Conf. on Green, Pervasive, and Cloud Computing, pp. 75-89, (2017)