Implementation of Cloud-based Access Control and Resource Management System
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Ye Wu,et al. Causality and Accountability , 2009, Formal Aspects in Security and Trust.
[3] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[4] Butler W. Lampson. Practical Principles for Computer Security , 2007 .
[6] Butler W. Lampson,et al. Authentication in distributed systems , 1993 .
[7] Ye Wu,et al. Security Correctness for Secure Nested Transactions - Extended Abstract , 2013, TGC.
[8] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).