Computer Science ›› 2016, Vol. 43 ›› Issue (10): 150-153.doi: 10.11896/j.issn.1002-137X.2016.10.028
Previous Articles Next Articles
LIU Zhi-feng and MAO Zhu-lin
[1] Park J,Sandhu R.Towards usage control models:beyond traditional access control[C]∥Proceedings of the Seventh ACM Symposium on Access Control models and Technologies.ACM,2002:57-64 [2] Park J,Sandhu R.The UCON ABC usage control model[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):128-174 [3] Wang Y D,Yang J H,Xu C,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,6(5):1129-1150(in Chinese) 王于丁,杨家海,徐聪,等.云计算访问控制技术研究综述[J].软件学报,2015,26(5):1129-1150 [4] Cai Ting,Chen Chang-zhi.Research for Access Control based on UCON in Cloud Computing[J].Computer Science,2014(S1):262-264(in Chinese) 蔡婷,陈昌志.云环境下基于UCON的访问控制模型研究[J].计算机科学,2014(S1):262-264 [5] Zhang Guang-hua.Research on Security Models Based on Trust Management[D].Xi’an:Xidian University,2014(in Chinese) 张光华.基于信任管理的安全模型研究[D].西安:西安电子科技大学,2014 [6] Guo Jing-jing,Ma Jian-feng,Li Qi,et al.Game theory basedtrust management method for mobile ad hoc networks[J].Journal on Communications,2014,35(11):50-58(in Chinese) 郭晶晶,马建峰,李琦,等.基于博弈论的移动自组织网络的信任管理方法[J].通信学报,2014,35(11):50-58 [7] Lv Jing-hua.Research on Techniques of Usage Control in Mobile Digital Publishing Rights Management [D].Beijing:Beijing University of Posts and Telecommunications,2013(in Chinese) 吕井华.移动数字出版版权保护使用控制技术研究[D].北京:北京邮电大学,2013 [8] Zhang Z,Yang L,Pei Q,et al.Research on usage control model with delegation characteristics based on OM-AM methodology[C]∥IFIP International Conference on Network and Parallel Computing Workshops,2007.NPC Workshops.IEEE,2007:238-243 [9] Cai Wei-hong.The Research of Access Control Model Based on EUCON [D].Guangzhou:South China University of Technology,2012(in Chinese) 蔡伟鸿.基于EUCON的访问控制技术研究[D].广州:华南理工大学,2012 [10] Salim F,Reid J,Dawson E.An administrative model forUCONABC [C]∥Proceedings of the Eighth Australasian Conference on Information Security-Volume 105.Australian Computer Society,Inc.,2010:32-38 [11] Lu Ke,Zhou Bao-qun,Wang Hui-fang.Usage Control ModelBased on Timed RBAC and Its Administration [J].Computer Engineering,2008,34(6):170-172(in Chinese) 鲁柯,周保群,王惠芳.基于带时间特性RBAC的使用控制模型及其管理[J].计算机工程,2008,34(6):170-172 [12] Shibli M A,Ali A.Extensible Access Control Framework for Cloud based Applications[EB/OL].http://ais.seecs.nust.edu.pk/project [13] Jiao D,Lianzhong L,Ting L,et al.Realization of UCON Model Based on extended-XACML[C]∥2011 International Conference on Future Computer Sciences and Application (ICFCSA).IEEE,2011:90-93 [14] Masood R,Shibli M A,Bilal M.Usage control model specification in XACML policy language[M]∥Computer Information Systems and Industrial Management.Springer Berlin Heidelberg,2012:68-79 [15] Colombo M,Lazouski A,Martinelli F,et al.A proposal on enhancing XACML with continuous usage control features[M]∥Grids,P2P and Services Computing.Springer US,2010:133-146 |
No related articles found! |
|