Computer Science ›› 2013, Vol. 40 ›› Issue (6): 132-137.
Previous Articles Next Articles
DOU Wen-yang,WANG Xiao-ming and ZHANG Li-chen
[1] Welser M.The computer of the 21’st Century[J].Scientific American,1991,5(3):66-75 [2] Michael F,Oliver R.Ubiquitous computing:An overview oftechnology impacts[J].Telematics and Informatics,2011,28(2):55-65 [3] Mieso K,Denko,Tao S,et al.Trust management in ubiquitous computing:A bayesin approach[J].Computer Communications,2010,34(3):398-406 [4] Jalal A M,Raquel H.Access control using threshold cryptography for ubiquitous computing environments[J].Journal of King Saud University Computer and Information Sciences,2011,34(1):1-8 [5] 林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,8(4):955-966 [6] 翟浩良,韩道军,李磊.基于情景演算的动态访问控制模型[J].计算机科学,2012,9(6):35-38 [7] Youna J,James B D.CRiBAC:Community-centric role interaction based access control model[J].Computers Security,2012,3(1):497-523 [8] Rafael T,Carlos M,Altair S.Applying a usage control model in an operating system kernel[J].Journal of Network and Computer Applications,2011,4(3):1342-1352 [9] Tao W,Zhang G Q.Trusted interaction approach for dynamicservice selection using multi-criteria decision making technique[J].Knowledge Based Systmes,2012,2(5):116-122 [10] 封孝生,王桢文,黎湘运.P2P中基于信任和属性的访问控制[J].计算机科学,2011,8(2):28-31 [11] Denko M K,Tao S,Issac W.Trust management in ubiquitous computing:A Bayesian approach[J].Computer Communications,2011,34(2):398-406 [12] Ding Y S,Liu F M,Tang B Y.Context-sensitive trust computing in distributed environments[J].Knowledge Based Systems,2012,28(11):105-114 [13] Bernd B.Ontology driven health information systems architectures enable pHealth for empowered patients[J].International Journal of Medical Informatics,2011,0(5):17-25 [14] Anisetti M,Ardagna C A,Bellandi V,et al.OpenAmbient:aPervasive Access Control Architecture[M].Security in Autonomous Systems,2006:160-172 [15] Vassilis K,Loukas H,Dimitris K,et al.A dynamic contex-taware access control architecture for e-services[J].Computers Security,2006,5(7):507-521 [16] Takabi,Amini,Jalili.Enhancing role-based access control model through fuzzy Relations[J].Information Assurance and Security,2007,5(3):131-136 [17] Zhang S,He D K.Fuzzy model for trust evaluation[J].Journal of Southwest Jiaotong University,2006,4(1):23-28 [18] 窦文阳,王小明,张立臣.普适计算环境下的动态模糊访问控制模型研究[J].计算机科学,2010,7(9):63-37 [19] Chen S M,Li W,Liu H C,et al.Multiattribute decision making based on interval-valued intuitionistic fuzzy values[J].Expert System with Applications,2012,9(13):343-351 [20] Sevastjanow P,Dymova L,Barosiewicz P.A new approach to normalization of interval and fuzzy weights[J].Fuzzy Sets and Systems,2012,8(2):34-45 |
No related articles found! |
|