A Distributed Authorization System with Mobile Usage Control Policies
暂无分享,去创建一个
[1] Christian Schaefer,et al. Usage Control Enforcement: Present and Future , 2008, IEEE Security & Privacy.
[2] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[3] Jan Vitek,et al. Secure Internet Programming , 1999 .
[4] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[5] SandhuRavi,et al. The UCONABC usage control model , 2004 .
[6] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[7] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[8] Eugene Ciurana,et al. Google App Engine , 2009 .
[9] Angelos D. Keromytis,et al. Key note: Trust management for public-key infrastructures , 1999 .
[10] Altair Olivo Santin,et al. Distributed Usage Control Architecture for Business Coalitions , 2009, 2009 IEEE International Conference on Communications.
[11] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[12] Christian Schaefer,et al. Policy Evolution in Distributed Usage Control , 2009, STM@IFIPTM.
[13] Fabio Martinelli,et al. On usage control for GRID systems , 2010, Future Gener. Comput. Syst..
[14] Fabio Martinelli,et al. Towards Continuous Usage Control on Grid Computational Services , 2005, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05).
[15] Jaehong Park,et al. Formal model and policy specification of usage control , 2005, TSEC.
[16] Ravi S. Sandhu,et al. Toward a Usage-Based Security Framework for Collaborative Computing Systems , 2008, TSEC.