[1] |
王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 1129-1150.
|
|
WANG Yuding, YANG Jiahai, XU Cong, et al. Survey on Access Control Technologies for Cloud Computing[J]. Journal of Software, 2015, 26(5): 1129-1150.
|
[2] |
RAY I, RAY I. Trust-based Access Control for Secure Cloud Computing[C]//High Performance Cloud Auditing and Applications. New York: Springer, 2014: 189-213.
|
[3] |
NAGHMOUCHI M Y, PERROT N, KHEIR N, et al. A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems[C]//Proceedings of the 2016 International Workshop on Managing Insider Security Threat. New York: ACM, 2016: 97-100.
|
[4] |
LAKSHMI H, NAMITHA S, SEEMANTHINI, et al. Risk Based Access Control in Cloud Computing[C]//Proceedings of the 2015 International Conference on Green Computing and Internet of Things. Piscataway: IEEE, 2015: 1502-1505.
|
[5] |
ALUVALU R, MUDDANA L. A Dynamic Attribute-based Risk Aware Access Control Model (DA-RAAC) for Cloud Computing[C]//Proceedings of the 2016 IEEE International Conference on Computational Intelligence and Computing Research. Piscataway: IEEE, 2016: 7919618.
|
[6] |
BOUCHAMI A, GOETTELMANN E, PERRIN O, et al. Enhancing Access-control with Risk-metrics for Collaboration on Social Cloud-platforms[C]//Proceedings of the 2015 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway: IEEE, 2015: 864-871.
|
[7] |
CHEN A, XING H, SHE K, et al. A Dynamic Risk-based Access Control Model for Cloud Computing[C]//Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing. Piscataway: IEEE, 2016: 579-584.
|
[8] |
熊金石, 秦洪涛, 李建华, 等. 基于信息熵的安全风险评估指标权重确定方法[J]. 系统科学学报, 2013, 25(2): 82-84.
|
|
XIONG Jinshi, QIN Hongtao, LI Jianhua, et al. Method of Determining Index Weight in Security Risk Evaluation Based on Information Entropy[J]. Chinese Journal of System Science, 2013, 25(2): 82-84.
|
[9] |
ZAHOOR E, PERRIN O, BOUCHAMI A. CATT: a Cloud Based Authorization Framework with Trust and Temporal Aspects[C]//Proceedings of the 2015 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. Piscataway: IEEE, 2015: 285-294.
|
[10] |
方开泰, 王东谦, 吴国富. 一类带约束的回归——配方回归[J]. 计算数学, 1982, 4(1): 57-69.
|
|
FANG Kaitai, WANG Dongqian, WU Guofu. A Class of Constrainted Regression-programming Regression[J]. Mathematica Numerica Sinica, 1982, 4(1): 57-69.
|
[11] |
陈庆丽, 张志勇, 向菲, 等. 面向多媒体社交网络的访问控制模型[J]. 西安电子科技大学学报, 2014, 41(6): 181-187.
|
|
CHEN Qingli, ZHANG Zhiyoung, XIANG Fei, et al. Research on the Access Control Model for Multimedia Social Networks[J]. Journal of Xidian University, 2014, 41(6): 181-187.
|