共 50 条
- [1] Clusters and security: Distributed security for distributed systems [J]. 2005 IEEE International Symposium on Cluster Computing and the Grid, Vols 1 and 2, 2005, : 96 - 104
- [2] Access authorization policy for XML document security [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 589 - 598
- [4] Distributed Security Policy Conformance [J]. FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 210 - 222
- [5] A new distributed security model for linux clusters [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 225 - 230
- [6] Policy classes and query rewriting algorithm for XML security views [J]. DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 104 - 118
- [7] Maintaining consistency of the security policy in distributed environment [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 179 - 186
- [8] Multilevel Policy Based Security in Distributed Database [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 572 - 580
- [9] Policy based interoperability in distributed security infrastructures [J]. CONCURRENT ENGINEERING: ENHANCED INTEROPERABLE SYSTEMS, 2003, : 1027 - 1034
- [10] Reliable Security Policy in Mobile Distributed Network [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1782 - 1786