共 50 条
- [41] System security model based on trusted access control under cloud computing environment Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
- [43] A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024, 2024, 201 : 415 - 425
- [44] Access control security model based on dual identity authentication in cloud computing environment Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 288 - 292
- [45] Ontology-based access control model for security policy reasoning in cloud computing JOURNAL OF SUPERCOMPUTING, 2014, 67 (03): : 711 - 722
- [46] Ontology-based access control model for security policy reasoning in cloud computing The Journal of Supercomputing, 2014, 67 : 711 - 722
- [47] ISCS (Information Security Check Service) for the Safety and Reliability of Communications PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 22 - 25
- [49] A Security Framework for Service Overlay Networks: Access Control 2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008), 2008, : 412 - 419
- [50] Simplifying CORBA security service to support service level access control ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 793 - 806