共 50 条
- [41] A context, rule and role-based access control model in enterprise pervasive computing environment [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
- [42] The CONNECT platform:: An architecture for context-aware privacy in pervasive environments [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 117 - 126
- [43] Enforcing Context-Awareness and Privacy-by-Design in the Specification of Information Systems [J]. BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2017, 2018, 309 : 87 - 111
- [44] Access Control Encryption: Enforcing Information Flow with Cryptography [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 547 - 576
- [45] Enforcing legal ownership rights by an access control system [J]. Computers and Security, 1996, 15 (03): : 212 - 220
- [46] Self-Enforcing Access Control for Encrypted RDF [J]. SEMANTIC WEB ( ESWC 2017), PT I, 2017, 10249 : 607 - 622
- [47] Modeling and Enforcing Access Control Policies for Smart Contracts [J]. 2022 FOURTH IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2022), 2022, : 38 - 47
- [48] ACStream: Enforcing Access Control Over Data Streams [J]. ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, : 1495 - +
- [49] Enforcing legal ownership rights by an access control system [J]. COMPUTERS & SECURITY, 1996, 15 (03) : 212 - 226