共 50 条
- [21] Trust and Risk based Access Control and Access Control Constraints [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
- [22] A trust-role based context aware access control model [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 371 - 376
- [23] Trust-based user-role assignment in role-based access control [J]. 2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 807 - +
- [24] Trust based Authorization and Access Control [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 162 - 165
- [25] Integration of Role Based Access Control with Homomorphic Cryptosystem for Secure and Controlled Access of Data in Cloud [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 194 - 199
- [27] Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks [J]. Journal of Signal Processing Systems, 2024, 96 : 153 - 168
- [28] Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2024, 96 (02): : 153 - 168
- [29] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud [J]. COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
- [30] Secure information sharing using attribute certificates and role based access control [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 269 - 276