共 50 条
- [41] Extending Mandatory Access Control Policies in Android INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 21 - 35
- [42] BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (05): : 1634 - 1652
- [44] An Effective Android Software Reinforcement Scheme Based on Online Key PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1544 - 1548
- [45] Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 55 - 63
- [46] Applications of the oriented permission role-based access control model 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
- [47] Access Control Scheme for Workflow 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 215 - 217
- [48] A permission-combination scalable access control model for Internet of things TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04):