Computer Science ›› 2015, Vol. 42 ›› Issue (8): 166-169.
Previous Articles Next Articles
TANG Cheng-hua, WANG Li-na, QIANG Bao-hua, TANG Shen-sheng and ZHANG Xin
[1] David B,Vincent J,Felix K,et al.Enforceable security policies revisited [J].ACM Transactions on Information and System Security,2013,16(1):31-56 [2] Mohan A,Blough D M,Kurc T,et al.Detection of conflicts and inconsistencies in taxonomy-based authorization policies [C]∥Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine.Atlanta,GA,2011:590-594 [3] Li Zang,Chu Chao-hsien,Yao Wen.A semantic authorizationmodel for pervasive healthcare [J].Journal of Network and Computer Applications,2014,38:76-87 [4] 李瑞轩,鲁剑锋,李添翼,等.一种访问控制策略非一致性冲突消解方法[J].计算机学报,2013,36(6):1210-1223 Li Rui-xuan,Lu Jian-feng,Li Tian-yi,et al.An approach for resolving inconsistency conflicts in access control policies [J].Chinese Journal of Computers,2013,36(6):1210-1223 [5] Bao Yi-bao,Yin Li-hua,Fang Bin-xing,et al.A novel logic-based automatic approach to constructing compliant security policies [J].Science China:Information Sciences,2012,55(1):149-164 [6] 包义保,殷利华,方滨兴,等.基于良基语义的安全策略表达与验证方法[J].软件学报,2012,23(4):912-927Bao Yi-bao,Yin Li-hua,Fang Bin-xing,et al.Approach of secu-rity policy expression and verification based on well-founded semantic [J].Journal of Software,2012,23(4):912-927 [7] Basile C,Cappadonia A,Lioy A.Network-level access control policy analysis and transformation [J].IEEE/ACM Transactions on Networking,2012,20(4):985-998 [8] 沈国华,张伟,黄志球,等.基于描述逻辑的特征语义建模及验证[J].计算机研究与发展,2013,50(7):1501-1512Shen Guo-hua,Zhang Wei,Huang Zhi-qiu,et al.Description- logic-based feature modeling and verification [J].Journal of Computer Research and Development,2013,50(7):1501-1512 [9] 王腾,朱青,王珊.基于语义相似度的Web信息可信分析[J].计算机学报,2013,36(8):1668-1681 Wang Teng,Zhu Qing,Wang Shan.Fact statements verification based on semantic similarity [J].Chinese Journal of Computers,2013,36(8):1668-1681 [10] 程勇,黄河,邱莉榕,等.一个基于相似度计算的动态多维概念映射算法[J].小型微型计算机系统,2006,27(6):975-979 Cheng Yong,Huang He,Qiu Li-rong,et al.Similarity-based dynamic multi-dimension concept mapping algorithm [J].Mini-Micro Systems,2006,27(6):975-979 [11] 郑晓洁,张琳.本体映射中相似度计算的改进[J].计算机科学,2013,40(12):108-112 Zheng Xiao-jie,Zhang Lin.Modification of similarity computation in ontology mapping [J].Computer Science,2013,40(12):108-112 [12] Kobra E,Amin R D,Mahmoud N.Overlapped ontology partitioning based on semantic similarity measures [C]∥Proceedings of the 5th International Symposium on Telecommunications.Tehran,Iran,2010:1013-1018 [13] Pirro G.A semantic similarity metric combining features and intrinsic information content [J].Data & Knowledge Engineering,2009,68(11):1289-1308 [14] Kunal V,Rama A,Richard G.Semantic matching of web service policies[C]∥Proceedings of the 2nd International Workshop on Semantic and Dynamic Web Processes.Orlando,USA,2005:1-12 [15] Gruber T R.A translation approach to portable ontology specifications [J].Knowledge Acquisition,1993,5(2):199-220 [16] 倪俊,陈晓苏,刘辉宇,等.网络安全策略求精一致性检测和冲突消解机制的研究[J].计算机科学,2011,38(2):32-37 Ni Jun,Chen Xiao-su,Liu Hui-yu,et al.Research on network security policy refinement consistency of detection and conflict resolution mechanisms [J].Computer Science,2011,38(2):32-37 |
No related articles found! |
|