[1] |
.[EB/OL].
|
[2] |
.[EB/OL].
|
[3] |
.[EB/OL].
|
[4] |
.[EB/OL].
|
[5] |
SANDHU R . The future of access control:attributes,automation,and adaptation[A]. Computational Intelligence,Cyber Security and Computational Models[C]. 2014. 45-45.
|
[6] |
冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-258. FENG D G , ZHANG M , LI H . Big data security and privacy protection[J]. Chinese Journal of Computers, 2014,37(1): 246-258.
|
[7] |
SANDHU R , PIERANGELA S . Access control:principle and practice[J]. Communications Magazine, 1994,32(9): 40-48.
|
[8] |
GRAHAM G S , DENNING P J . Protection:principles and practice[A]. Proceedings of the Conference[C]. ACM, 1972. 417-429.
|
[9] |
HARRISON M A , RUZZO W L , ULLMANJ D . Protection in operating systems[J]. Communications of the ACM, 1976,19(8): 461-471.
|
[10] |
SANDHU R , COYNE E , FEINSTEIN H ,et al. Role-based access control models[J]. Computer, 1996,29(2): 38-47.
|
[11] |
JASONPROGRAMOFFICE . Horizontal Integration:Broader Access Models for Realizing Information Dominance[R]. The MITRE Corporation 2004.
|
[12] |
WANG Q , JIN H . Quantified risk-adaptive access control for patient privacy protection in health information systems[A]. Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security[C]. ACM, 2011. 406-410.
|
[13] |
CHENG P C , ROHATGI P , KESER C ,et al. Fuzzy multi-level security:an experiment on quantified risk-adaptive access control[A]. IEEE Symposium on Security and Privacy(SP '07)[C]. IEEE, 2007. 222-230.
|
[14] |
NI Q , BERINNO E , LOBO J . Risk-based access control systems built on fuzzy inferences[A]. In Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security[C].ACM. 2010. 250-260.
|
[15] |
NISSANK N , KHAYAT E J . Risk based security analysis of permissons in RBAC[A]. Proceedings of the 2nd International Workshop on Security in Information Systems,2004[C]. IEEE, 2004. 332-341.
|
[16] |
CELIKEL E , KANTARCIOGLU M , THURAISINGHAM B M ,et al. A risk management approach to RBAC[J]. Risk and Decision Analysis, 2009,1(1): 21-33.
|
[17] |
CHEN L , JASON C . Risk-aware role-based access control[A]. Security and Trust Management[C]. Springer Berlin Heidelberg, 2012. 140-156.
|
[18] |
BIJON K Z , KRISHNAN R , SANDHU R . A framework for risk-aware role based access control[A]. Proceedings of the 6th Symposium on Security Analytics and Automation 2013[C]. IEEE, 2013. 462-469.
|
[19] |
MCGRAW R . Risk-adaptable access control RADAC[R]. Privilege (Access) Management Workshop, 2009.
|
[20] |
SANTOS D R , WESTPHALL C M , WESTPHALL C B . A dynamic risk-based access control architecture for cloud computing[A]. IEEE Network Operations & Management Symposium[C]. IEEE, 2014. 1-9.
|
[21] |
谢文冲, 杨英杰, 汪永伟 ,等. 基于风险的访问控制操作需求计算方法研究[J]. 计算机工程与设计, 2013,34(7): 2281-2285. XIE W C , YANG Y J , WANG Y W ,et al. Research on computing method of operational need in risk-based access control[J]. Computer Engineering and Design, 2013,34(7): 2281-2285.
|
[22] |
王超, 陈性元 . 基于加权熵的访问控制策略安全性分析研究[J]. 电子学报, 2013,41(1): 47-51. WANG C , CHEN X Y . An approach for security analysis to access control policy based on entropy-weigh[J]. Acta Electronica Sinica, 2013,41(1): 47-51.
|
[23] |
DEMPSTER A P , LAIRD N M , RUBIN D B . Maximum likelihood from incomplete data via the EM algorithm[J]. Journal of the Royal Statistical Society,Series B (Methodological), 1977: 1-38.
|