共 50 条
- [1] Defending of Trusted Access Control in Cloud Computing [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
- [2] System security model based on trusted access control under cloud computing environment [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10):
- [3] An Enhanced Access Control Model Based on Trusted Computing [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 920 - 928
- [4] Study on Access Control Based on Trusted Computing [J]. MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +
- [6] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
- [8] Profile Based Access Control Model in Cloud Computing Environment [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
- [10] A Trust-role Access Control Model Facing Cloud Computing [J]. PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 5239 - 5242