Trust-Based Fuzzy Access Control Model Research
暂无分享,去创建一个
Yongping Zhang | Shaojing Fan | Zhongkun He | Rina Su | Yongping Zhang | Zhongkun He | Rina Su | Shaojing Fan
[1] Mark Weiser. The computer for the 21st century , 1991 .
[2] Lech J. Janczewski,et al. "Need-to-know" principle and fuzzy security clearances modelling , 2000, Inf. Manag. Comput. Secur..
[3] Charalampos Z. Patrikakis,et al. Security and Privacy in Pervasive Computing , 2007, IEEE Pervasive Computing.
[4] Tharam S. Dillon,et al. The Fuzzy and Dynamic Nature of Trust , 2005, TrustBus.
[5] Ravi S. Sandhu,et al. The ARBAC97 model for role-based administration of roles: preliminary description and outline , 1997, RBAC '97.
[6] Wang Xiao-ming. Trustworthiness-based fuzzy adaptive access control model for pervasive computing , 2009 .
[7] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[8] Hilary H. Hosmer,et al. Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm , 1993, NSPW '92-93.
[9] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[10] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.