Computer Science ›› 2015, Vol. 42 ›› Issue (4): 132-135.doi: 10.11896/j.issn.1002-137X.2015.04.026
Previous Articles Next Articles
FENG Wei-ning, ZHANG Zhi-yong and ZHAO Chang-wei
[1] 孟芳慧,曹宝香,杨义先.钮心忻多媒体数字产品版权保护模型研究与设计[J].计算机科学,2013,0(1):98-102 [2] 张硕,马兆丰,芦效峰,等.音乐内容动态加密与许可授权系统设计与实现[J].计算机科学,2011,8(12):43-48 [3] 锁琰,徐小岩,张毓森,等.支持组件动态更新的远程证明[J].西安电子科技大学学报,2012,8(4):11-19 [4] Park J,Sandhu R.The UCON ABC usage control model[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):128-174 [5] Zhang Z,Yang L,Pei Q,et al.Research on usage control model with delegation characteristics based on OM-AM methodology[C]∥IFIP International Conference on Network and Parallel Computing Workshops,2007(NPC Workshops).IEEE,2007:238-243 [6] Hu X L,Osborn S L.A new approach for delegation in usagecontrol[C]∥Proceedings of the third ACM conference on Data and application security and privacy.ACM,2013:269-276 [7] Lei Jian-yun.Weighted Directed Graph-Based Authorization De-legation Model[J].Journal of Networks,2013,8(12):2812-2815 [8] Gaaloul K,Proper H A,Charoy F.Delegation Protocols in Human-Centric Workflows[C]∥Proceedings 13th IEEE International Conference on Commerce and Enterprise Computing 2011(CEC 2011).New Jersey,NJ:IEEE Computer Society,2011:219-224 [9] Sun Dao-qing.UCSSDAP:Ubiquitous Computing Service Securi-ty Delegation Authorization Protocol[C]∥2011 IEEE International Conference on Automation and Logistics(ICAL 2011).New Jersey,NJ:IEEE Computer Society,2011:371-374 [10] Osborn S L,He Wang.A Survey of Delegation from an RBAC Perspective[J].Journal of Software,2013,8(2):266-275 [11] 冯雪,俞银燕,汤帜.具有硬件适应性的多设备内容共享与版权保护方法[J].北京大学学报:自然科学版,2011,7(6):1009-1016 [12] Zhang Yong,Xiang Xue,Hai Feng,et al.An anonymous remote attestation for trusted cloud computing[C]∥Proceedings 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems 2012.(IEEE CCIS 2012)Washington,DC:IEEE Computer Society,2012:426-429 [13] Yu Yue,Wang Huai-min,Liu Bo,et al.A Trusted remote attestation model based on trusted computing[C]∥2013 12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications,2013.Washington,DC:IEEE Computer Society,2013:1504-1509 [14] Guo Jia-ming,Wei Jiang.Analysis and research of remote attestation based on trusted computing[C]∥2013 Fourth International Conference on Digital Manufacturing & Automation,2013.Washington,DC:IEEE Computer Society,2013:192-195 [15] Li Ya-ping,Zhou Wei-liang.Research on the delegation schemes of the UCONABC[J].Journal of University of Science and Technology of China,2012,2(2):154-160 |
No related articles found! |
|