共 50 条
- [32] An overview of integrity constraints enforcement for a distributed database [J]. PDPTA'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, 2001, : 822 - 828
- [33] Distributed Enforcement of Sticky Policies with Flexible Trust [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1202 - 1209
- [35] A distributed privacy enforcement architecture based on Kerberos [J]. WSEAS Trans. Commun., 2006, 2 (231-238):
- [36] Distributed constraint satisfaction and optimization with privacy enforcement [J]. IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY, PROCEEDINGS, 2004, : 531 - 535
- [37] THE IMPLEMENTATION OF A COMMERCIALLY AVAILABLE PACS THROUGH DISTRIBUTED-PROCESSING [J]. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS, 1984, 515 : 46 - 51
- [39] Quantitative analysis and enforcement of the principle of least privilege in role-based access control [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +