Computer Science ›› 2016, Vol. 43 ›› Issue (6): 141-145.doi: 10.11896/j.issn.1002-137X.2016.06.029
Previous Articles Next Articles
TANG Cheng-hua, ZHANG Xin, WANG Lu, WANG Yu and QIANG Bao-hua
[1] Xiong Y,Zhu Y,Yu P S.Top-k Similarity Join in Heterogeneous Information Networks[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(6):1710-1723 [2] David B,Vincent J,Felix K,et al.Enforceable security policies revisited[J].ACM Transactions on Information and System Security,2013,16(1):31-56 [3] Jin Li,Lu Zheng-ding,Zhao Feng.Research development on Secure Interoperation in multi-domain environment[J].Computer Science,2009,36(2):47-54(in Chinese) 金莉,卢正鼎,赵峰.多域环境下安全互操作研究进展[J].计算机科学,2009,36(2):47-54 [4] Gong L,Qian X.Computational issues in secure interoperation[J].IEEE Transactions on Software and Engineering,1996,22(1):43-52 [5] Demchenko Y,Gommans L,Tokmakoff A,et al.Policy Based Access Control in Dynamic Grid-based Collaborative Environment[C]∥Proceedings of the 2006 Int.Symposium on Collaborative Technologies and Systems.Las Vegas,USA:IEEE Computer Society,2006:64-73 [6] Dong Zhi-hua,Zhu Yuan-chang,Di Yan-qiang.Multi-architec-ture system interoperability approach using common data exchange model[J].Journal of Beijing University of Technology,2015,41(1):60-67(in Chinese) 董志华,朱元昌,邸彦强.利用通用数据交换模型实现多体系结构系统互操作的方法[J].北京工业大学学报,2015,1(1):60-67 [7] Squicciarini A C,Bertino E,Trombetta A,et al.A Flexible Approach to Multisession Trust Negotiations[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):16-29 [8] Liu Wei,Cai Jia-yong,He Ye-ping.A trustworthiness based ad-hoc secure interoperation method[J].Journal of Software,2007,18(8):1958-1967(in Chinese) 刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法[J].软件学报,2007,18(8):1958-1967 [9] Xie Si-jiang,Zha Ya-xing,Chi Ya-ping.Trust level based secure interoperation model[J].Application Research of Computer,2012,29(5):1922-1925(in Chinese) 谢四江,查雅行,池亚平.一种基于可信等级的安全互操作模型[J].计算机应用研究,2012,29(5):1922-1925 [10] Zou De-qing,Zou Yong-qiang,Qiang Wei-zhong,et al.Grid security interoperation and its application[J].Chinese Journal of Computers,2010,3(3):514-525(in Chinese) 邹德清,邹永强,羌卫中,等.网格安全互操作及其应用研究[J].计算机学报,2010,3(3):514-525 [11] Ye Chun-xiao,Guo Dong-heng.Research on secure interoperation in multi-domain environment[J].Journal of Computer Applications,2012,2(12):3422-3425(in Chinese) 叶春晓,郭东恒.多域环境下安全互操作研究[J].计算机应用,2012,2(12):3422-3425 [12] Zhang Shuai,Sun Jian-ling,Xu Bin,et al.RBAC based access control model for services compositions cross multiple enterprises[J].Journal of Zhejiang University(Engineering Science),2012,6(11):2035-2043(in Chinese) 张帅,孙建伶,徐斌,等.基于RBAC的跨多企业服务组合访问控制模型[J],浙江大学学报(工学版),2012,6(11):2035-2043 |
No related articles found! |
|