共 50 条
- [31] Modeling MAC Permissions Using Trust-Based Access Control and Actions [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 1547 - 1551
- [32] Trust-based Access Control Model in Multi-domain Environment [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 149 - 160
- [33] Possibilistic Reasoning for Trust-based Access Control Enforcement in Social Networks [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2010), 2010,
- [34] Application of Fuzzy Neural Network in the Trust-Based Access Control Model [J]. 2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1273 - 1276
- [35] Role Performance Trust-Based Access Control for Protecting Sensitive Attributes [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 153 - 171
- [36] Toward a decentralized trust-based access control system for dynamic collaboration [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 317 - 324
- [37] ValID: A trust-based virtual assessment system [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 328 - 335
- [38] A trust-based model using learning FCM for partner selection in the virtual enterprises [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2007, 4681 : 690 - +
- [39] Trust-based user-role assignment in role-based access control [J]. 2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 807 - +
- [40] Performance-Aware Trust-Based Access Control for Protecting Sensitive Attributes [J]. RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING, 2017, 549 : 560 - 569