共 50 条
- [1] Trusted Access Control Model Based on Role and Task in Cloud Computing [J]. 2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
- [2] Risk Based Access Control In Cloud Computing [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1502 - 1505
- [3] Design of Cloud Computing Resources based on Web Access Model [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1756 - 1759
- [4] Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing [J]. NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 358 - 368
- [5] QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 992 - 998
- [6] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
- [7] Resources allocation method on cloud computing [J]. PROCEEDINGS 2014 INTERNATIONAL CONFERENCE ON SERVICE SCIENCES (ICSS 2014), 2014, : 199 - 201
- [8] ACCESS CONTROL MECHANISM FOR COMPUTING RESOURCES [J]. IBM SYSTEMS JOURNAL, 1975, 14 (03) : 212 - 228
- [10] Profile Based Access Control Model in Cloud Computing Environment [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,