共 50 条
- [31] Levelled attribute-based encryption for hierarchical access control [J]. Computer Standards and Interfaces, 2025, 93
- [32] Efficient Attribute-Based Comparable Data Access Control [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
- [33] Attribute-based Access Control for ICN Naming Scheme [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
- [34] Automated trust negotiation in attribute-based access control [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 252 - 257
- [35] Deconflicting policies in attribute-based access control systems [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
- [36] Attribute-based access control management for multicloud collaboration [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
- [37] Attribute-based access control policies composition algebra [J]. Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
- [38] Attribute-based data access control scheme with secure revocation in fog computing for smart grid [J]. Cluster Computing, 2022, 25 : 3899 - 3913
- [39] Evolutionary Inference of Attribute-Based Access Control Policies [J]. EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
- [40] An attribute-based access control model for Web services [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 74 - +