共 50 条
- [3] Using trust assumptions with security requirements Requirements Engineering, 2006, 11 : 138 - 151
- [5] Modeling of Security and Stability Control for Power Systems Using Causal Analysis PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 6109 - 6114
- [8] Enhancing Security in the Cloud: when Traceability meets Access Control 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 365 - 366