共 50 条
- [41] Modeling Access Control Requirements in Feature Model APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 241 - +
- [43] Feature Modeling of the Evolving Access Control Requirements TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 392 - +
- [44] Access control requirements for preventing insider threats INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 529 - 534
- [45] A Survey on Machine Learning-based Medium access control technology for 6G requirements 2021 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2021,
- [46] Study on Access Control for Cloud Storage Security PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 333 - 336
- [47] A Hierarchical Access Control Technology for Cloud Storage 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 35 - 40
- [48] Quantitative Policy Repair for Access Control on the Cloud PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 564 - 575
- [49] An Algebra for Composing Access Control Policies in Cloud INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
- [50] Defending of Trusted Access Control in Cloud Computing INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166