Computer Science ›› 2017, Vol. 44 ›› Issue (11): 134-145.doi: 10.11896/j.issn.1002-137X.2017.11.021
Previous Articles Next Articles
CAO Wan-tian and YU Peng-fei
[1] We Are Social.http://wearesocial.net. [2] BYOD:Bring your own device.http://www.ibm.com/mobilefirst/us/en/bring-your-own-device/byod.html. [3] RISSANEN E.extensible access control markup language (xacml) version 3.0.http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-en.html. [4] XPTester:XACML Policy Tester.http://seg.nju.edu.cn/XPTester. [5] SANDHU R S,SAMARATI P.Access control:principle and practice[J].Communications Magazine,IEEE,1994,32(9):40-48. [6] FERRAIOLO D F,SANDHU R,GAVRILA S,et al.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security (TISSEC),2001,4(3):224-274. [7] FERRAIOLO D,KUHN D R,CHANDRAMOULI R.Role-based access control[M].Artech House,2003. [8] SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].Computer,1996,29(2):38-47. [9] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proceedings of the 13th ACM conference on Computer and communications security.ACM,2006:89-98. [10] OASIS.https://www.oasis-open.org/cn. [11] XML安全:使用XACML控制信息访问.http://www.ibm.com/developerworks/cn/xml/x-xacml. [12] 李刚.疯狂Android讲义(第2版)[M].北京:电子工业出版社,2013. [13] Android Developers.http://developer.android.com/in-dex.html. [14] “Balana” The Open source XACML 3.0 implementation.http://xacmlinfo.org/2012/08/16/balana-the-open-source-xacml-3-0-implementation. [15] XACML-Editor.http://sourceforge.net/projects/umu-xacmleditor. |
No related articles found! |
|