[1] |
刘莎, 谭良 . Hadoop 云平台中基于信任的访问控制模型[J]. 计算机科学 2014,41(5): 155-163.
|
|
LIU S , TAN L . A access control model based on trust in Hadoop cloud platform[J]. Journal of Computer Science, 2014,41(5): 155-163.
|
[2] |
CHENG P C , ROHATGI P , KESER C , et al. Fuzzy multi-level security: an experiment on quantified risk-adaptive access control[C]// IEEE Symposium on Security and Privacy. c 2007: 222-230.
|
[3] |
NI Q , BERTINO E , LOBO J . Risk-based access control systems built on fuzzy inferences[C]// The 5th ACM Symposium on Infor-mation, Computer and Communications Security. c 2010: 250-260.
|
[4] |
KIRKPATRICK M S , GHINITA G , BERTINO E . Privacy-preserving enforcement of spatially aware RBAC[C]// IEEE Transactions on De-pendable and Secure Computing. c 2012: 627-640.
|
[5] |
PASHALIDIS A , PRENEEL B . Evaluating tag-based preference obfuscation systems[C]// IEEE Transactions on Knowledge and Data Engineering. c 2012: 1613-1623.
|
[6] |
冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-258.
|
|
FENG D G , ZHANG M , LI H . Big date security and privacy pro-tection[J]. Journal of Computers, 2014,37(1): 246-258.
|
[7] |
WANG Q , JIN H . Quantified risk-adaptive access control for pa-tient privacy protection in health information systems[C]// The 6th ACM Symposium on Information, Computer and Communications Security. c 2011: 406-410.
|
[8] |
李凤华, 苏铓, 史国振 , 等. 访问控制模型研究进展及发展趋势[J]. 电子学报 2012,40(4): 805-813.
|
|
LI F H , SU M , SHI G Z , et al. Research progress and developing trends of access control model[J]. Journal of Electronics, 2012,40(4): 805-813.
|
[9] |
刘逸敏, 周浩峰, 王智慧 , 等. Purpose 融合: 基于风险 purpose的隐私查询访问控制[J]. 计算机学报, 2010(8): 1339-1348.
|
|
LIU Y M , ZHOU H F , WANG Z H , et al. The purpose convergence:privacy query access control based on risk purpose[J]. Journal of Computers, 2010(8): 1339-1348.
|