共 50 条
- [42] Privacy Policy Enforcement For Health Information Data Access [J]. 1ST ACM INTERNATIONAL WORKSHOP ON MEDICAL-GRADE WIRELESS NETWORKS, 2009, : 39 - 44
- [43] CAPE: Continuous Access Policy Enforcement for IoT Deployments [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1576 - 1581
- [44] Trust and Risk based Access Control and Access Control Constraints [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
- [45] Blockaid: Data Access Policy Enforcement forWeb Applications [J]. PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2022, 2022, : 701 - 718
- [46] An Attribute-Based Access Control Extension for OpenStack and its Enforcement Utilizing the Policy Machine [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 37 - 45
- [47] Research on Zero Trust Access Control Model and Formalization Based on Rail Transit Data Platform [J]. 2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 689 - 695
- [49] Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic [J]. New Generation Computing, 2021, 39 : 599 - 622