共 50 条
- [1] A secure, constraint-aware role-based access control interoperation framework [J]. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
- [3] Integrating trust and role for secure interoperation in multi-domain environment [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 77 - 82
- [4] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73
- [5] On Role Mappings for RBAC-based Secure Interoperation [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
- [6] Secure Cloud Storage System by Integrating Trust with Role Based Access Control and Cryptographic Algorithm [J]. TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, : 87 - 97
- [8] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
- [10] Ontology based hybrid access control for automatic interoperation [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 323 - +