Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 262-264.
Previous Articles Next Articles
CAI Ting and CHEN Chang-zhi
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,2(1):71-83 [2] 赵明斌,姚志强.基于RBAC的云计算访问控制模型[J].计算机应用,2012,2(S2):267-270 [3] Ferraiolo D,Cugini J,Kuhn D R.Role Based Access Control(RBAC):Features and Motivations[C]∥Proc.1995Computer Security Applications Conference.December 1995:241-248 [4] Sandhu R,Park J.Towards Usage Control Models:Beyond traditional access control[C]∥Proceedings of the 7th ACM Symposium on Access Control Models and Technologies.2002:57-64 [5] 聂丽平.基于UCON访问控制模型的分析与研究[D]:合肥:合肥工业大学,2006 [6] 崔永泉,洪帆,龙涛,等.基于使用控制和上下文的动态网络访问控制模型研究[J].计算机科学,2008,5(2):37-41 [7] Yao Dong-mei,Pan Jing-gui.A Method of Solving Geographical Constraints in Cloud Computing with UCON Access Control Model[C]∥The 3rd International Conference on Information Science and Engineering.Yangzhou:ICISE,2012:5111-5114 [8] Krautsevich L,Lazouski A,Martineli F,et al.Risk-Aware Usa-ge Decision Making in Highly Dynamic Systems[C]∥The Fifth International Conference on Internet Monitoring and Protection.Barcelona:Spain,2010 [9] 李钢,李沛武,胡海霞.使用控制系统中属性更新的并发控制研究[J].南京工程学院学报,2008,7(4):19-23 [10] Ghemawat S,Gobioff H,Leung S T.The Google File System[C]∥Proc.of the 19th ACM Symposium on Operating Systems Principles.New York:ACM Press,2003:29-43 [11] 陈坤定.消息摘要算法在Java Web系统中的应用[J].长春大学学报,2012,2(4):409-412 [12] Zhu Yan,Hu Hong-xin,Ahn G-J.Towards temporal access control in cloud computing[C]∥INFOCOM,Proceedings IEEE.2012:2576-2580 |
No related articles found! |
|