共 50 条
- [22] A Trusted Role-Based Access Control Model for Dynamic Collaboration in a Federated Environment [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 181 - 186
- [23] System security model based on trusted access control under cloud computing environment [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
- [25] Usage control reference monitor architecture [J]. Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Proceedings, 2007, : 13 - 18
- [26] Study on the Architecture and Management Platform Model of Trusted Network [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 514 - +
- [28] An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 540 - 547
- [30] Retaining Control Over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and Attestation [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 172 - 180