[1] |
National Computer Security Center.Glossary of computer security terms NCSC-TG-004)[EB/OL].
|
[2] |
BELL D E , LAPADULA L J . Secure computer systems:mathematical foundations[R]. MITRE CORP BEDFORD MA, 1973.
|
[3] |
STALLINGS W . Network and internetwork security:princip and practice[M]. Englewood Cliffs:Prentice Hall, 1995.
|
[4] |
FERRAIOLO D F , KUHN D R . Role-based access con-trol[C]// National Computer Security Conference. c1992: 554-563.
|
[5] |
OH S , SANDHU R , ZHANG X . An effective role administration mod-el using organization structure[J]. ACM Transactions on Information and System Security (TISSEC), 2006,9(2): 113-137.
|
[6] |
SANDHU R , BHAMIDIPATI V , MUNAWER Q . The ARBAC97 model for role-based administration of roles[J]. ACM Transactions on Information and System Security, 1999,2(1): 105-135.
|
[7] |
SANDHU R , MUNAWER Q , The ARBAC99 model for administra-tion of roles[C]// Annual Computer Security Applications Conference. c1999: 229-238.
|
[8] |
SANDHU R S , COYNE E J , FEINSTEIN H L , et al. Role-based access control models[J]. Computer, 1996(2): 38-47.
|
[9] |
FREUDENTHAL E , PESIN T , PORT L , et al. dRBAC:distributed role-based access control for dynamic coalition environments[C]// In-ternational Conference on Distributed Computing System. c2002: 411-420.
|
[10] |
LIU S , HUANG H . Role-based access control for distributed coopera-tion environment[C]// International Conference onComputational Intel-ligence and Security. c2009: 455-459.
|
[11] |
PARK J , SANDHU R . The UCON ABC usage control model[J]. ACM Transactions on Information and System Security (TISSEC), 2004,7(1): 128-174.
|
[12] |
KATT B , ZhANG X W , BREU R , et al. A general obligation model and continuity:enhanced policy enforcement engine for usage con-trol[C]// ACM Symposium on Access Control Models and Technolo-gies, Estes Park,CO,USA, c2008: 683-695.
|
[13] |
LOVAT E , PRETSCHNER . Data-centric multi-layer usage control enforcement:a social network example[C]// ACM Symposium on Access Control Models and Technologies. Innsbruck,Austria, c2011: 151-152.
|
[14] |
XU C , WANG Q , ZHANG W , et al. Temporal access control based on multiple subjects[C]// International Conference on Multimedia Infor-mation Networking and Security. c2009: 438-441.
|
[15] |
BERTINO E , BONATTI P A , FERRARI E . TRBAC:a temporal role-based access control model[J]. ACM Transactions on Information and System Security (TISSEC), 2001,4(3): 191-233.
|
[16] |
王小明, 赵宗涛 . 基于角色的时态对象存取控制模型[J]. 电子学报, 2005,33(9): 1634-1638. WANG X M , ZHAO Z T . Role-based access control model of tem-poral object[J]. Acta Electronica Sinica, 2005,33(9): 1634-1638.
|
[17] |
XU C , WANG Q , ZHANG W , et al. Temporal access control based on multiple subjects[C]// International Conference on Multimedia Infor-mation Networking and Security. c2009: 438-441.
|
[18] |
YUAN E , TONG J . Attributed based access control (ABAC) for Web services[C]// The IEEE International Conference on Web Services. FL,USA, c2005: 561-569.
|
[19] |
李晓峰, 冯登国, 陈朝武 , 等. 基于属性的访问控制模型[J]. 通信学报, 2008,29(4): 90-98. LI X F , FENG D G , CHEN Z W , et al. Model for attribute based access control[J]. Journal on Communications, 2008,29(4): 90-98.
|
[20] |
王小明, 付红, 张立臣 . 基于属性的访问控制研究进展[J]. 电子学报, 2010,38(7): 1660-1667. WANG X M , FU H , ZHANG L C , et al. Research progress on attribute-based access control[J]. Acta Electronica Sinica, 2010,38(7): 1660-1667.
|
[21] |
PIRRETTI M , TRAVNOR P , MCDANIEL P , et al. Secure attribute-based systems[J]. Journal of Computer Security, 2010,18(5): 799-837.
|
[22] |
李凤华, 王巍, 马建峰 , 等. 基于行为的访问控制模型及其行为管理[J]. 电子学报, 2008,36(10): 1881-1890. LI F H , WANG W , MA J F , et al. Action-based access control model and administration of actions[J]. Acta Electronica Sinica, 2008,36(10): 1881-1890.
|
[23] |
RIVEST R , SHAMIR A , WAGNER D A . Time-lock puzzles and timed-release crypto[R]. MIT LCS Tech.Report MIT/LCS/TR-684, 1996.
|
[24] |
CATHALO J , LIBERT B , QUISQUATER J J . Efficient and non-interactive timed-release encryption[M]. Information and Com-munications Security, 2005: 291-303.
|
[25] |
PATERSON K G , QUAGLIA E A . Time-specific encryption[M]// Security and Cryptography for Networks, 2010: 1-16.
|
[26] |
ZHOU L , VARADHARAJAN V , HITCHENS M . Enforcing role-based access control for secure data storage in the cloud[J]. The Computer Journal, 2011,54(10): 1675-1687.
|
[27] |
BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing[C]// CRYPTO, California,USA c2001: 213-229.
|
[28] |
ROUSELAKIS Y , WATERS B . Practical constructions and new proof methods for large universe attribute-based encryption[C]// ACM Con-ference on Computer and Communications Security. Berlin,Germany, c2013: 463-474.
|
[29] |
LEWKO A , WATERS B . Unbounded HIBE and attribute-based en-cryption[C]// Annual International Conference on the Theory and Ap-plications of Cryptographic Techniques. Tallinn,Estonia, c2011: 547-567.
|
[30] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// ACM Conference on Computer and Communications Security. VA,USA, c2006: 89-98.
|
[31] |
BETHENCOURT J , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. California,USA, c2007: 321-334.
|
[32] |
洪澄, 张敏, 冯登国 . AB-ACCS一种云存储密文访问控制方法[J]. 计算机研究与发展, 2010,47(Z1): 259-265. HONG C , ZHANG M , FENG D G . AB-ACCS:a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010,47(Z1): 259-265.
|
[33] |
CHENG Y , REN J , WANG Z , et al. Re-encryption optimization in CP-ABE based cryptographic cloud storage[C]// International Confe-rence on Cloud and Green Computing. Huanan,China, C2012: 173-179.
|
[34] |
CHASE M , CHOW S S M . Improving privacy and security in mul-ti-authority attribute-based encryption[C]// ACM conference on Com-puter and Communications Security. Illinois,USA, C2009: 121-130.
|
[35] |
LIU X , ZHANG Y , WANG B , et al. Mona:secure multi-owner data sharing for dynamic groups in the cloud[J]. IEEE Transaction on Pa-rallel and Distributed Systems, 2013,24(6): 1182-1191.
|