共 50 条
- [1] Implementation of Access Control Model for Distributed Information Systems Using Usage Control [J]. SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 54 - 67
- [2] Access control in distributed systems [J]. COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 21 - 28
- [3] Access Control in Distributed Systems [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1 - 2
- [4] Privacy-centric Access Control for Distributed Heterogeneous Medical Information Systems [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, : 297 - 306
- [5] Access Control Models in Heterogeneous Information Systems: from Conception to Exploitation [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 765 - 770
- [7] Adaptive access control in distributed systems [J]. IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 991 - 995
- [8] Defence Methodologies of AV Evasion for access control and information assurance in Industrial Distributed control systems and SCADA systems [J]. 2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
- [9] Access control in distributed object systems: Problems with access control lists [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 163 - 164