共 50 条
- [1] Secure authorization, access control and data integrity in Bluetooth [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON 2002), PROCEEDINGS, 2002, : 428 - 433
- [3] Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing [J]. INFORMATION SYSTEMS SECURITY, 2011, 7093 : 102 - 115
- [5] Authorization and access control to secure web services in a grid infrastructure [J]. WEBIST 2006: Proceedings of the Second International Conference on Web Information Systems and Technologies: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 264 - 267
- [6] Secure Authorization for Controlling Access via Key Management Scheme [J]. 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
- [7] Secure Decision Tree Classification with Decentralized Authorization and Access Control [J]. 2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 105 - 112
- [8] Authorization Enforcement Detection [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
- [9] Authorization in the digital library: Secure access to services across enterprise boundaries [J]. PROCEEDINGS OF THE THIRD FORUM ON RESEARCH AND TECHNOLOGY ADVANCES IN DIGITAL LIBRARIES (ADL '96), 1996, : 110 - 119
- [10] Policy-based authentication and authorization: Secure access to the network infrastructure [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 328 - 333