共 50 条
- [1] Maintaining consistency of the security policy using timestamp ordering [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS, 2002, : 164 - 170
- [2] Maintaining consistency in distributed network games [J]. 2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 374 - 379
- [3] Managing security policy in a large distributed Web Services environment [J]. 27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 610 - 615
- [5] Distributed databases: Security, consistency, and replication [J]. INNOVATION AND KNOWLEDGE MANAGEMENT: A GLOBAL COMPETITIVE ADVANTAGE, VOLS 1-4, 2011, : 941 - 949
- [6] Maintaining Arc Consistency Asynchronously in Synchronous Distributed Search [J]. 2012 IEEE 24TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2012), VOL 1, 2012, : 33 - 40
- [7] Maintaining consistency of twin transaction model using mobility-enabled distributed file system environment [J]. 13TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2002, : 752 - 756
- [8] Maintaining global consistency of temporal constraints in a dynamic environment [J]. DEVELOPMENTS IN APPLIED ARTIFICIAL INTELLIGENCE, 2003, 2718 : 779 - 788
- [10] Distributed Security Policy Conformance [J]. FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 210 - 222