[1] |
沈荣骏 . 我国天地一体化航天互联网构想[J]. 中国工程科学, 2006,8(10): 19-30.
|
|
SHEN R J . Some thoughts of (Chinese) integrated space-ground network system[J]. Engineering Science, 2006,8(10): 19-30.
|
[2] |
GUBBI J , BUYYA R , MARUSIC S ,et al. Internet of things (IoT):a vision,architectural elements,and future directions[J]. Future Generation Computer Systems, 2013,29(7): 1645-1660.
|
[3] |
张蓉, 徐晔, 闵小峰 . 美协会发表2016年卫星产业状况报告[J]. 中国航天, 2016,8: 38-44.
|
|
ZHANG R , XU Y , MIN X F . 2016 SIA state of the satellite industry report[J]. Aerospace China, 2016,8: 38-44.
|
[4] |
ANGGOROJATI B , MAHALLE P , PRASAO N R ,et al. Capability-based access control delegation model on the federated IoT network[C]// Symposium on Wireless Personal Multimedia Communications. 2012: 604-608.
|
[5] |
GUSMEROLI S , PICCIONE S , ROTONDI D . IoT access control issues:a capability based approach[C]// The IEEE International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. 2012: 787-792.
|
[6] |
GUSMEROLI S , PICCIONE S , ROTONDI D . A capability-based security approach to manage access control in the internet of things[J]. Mathematical and Computer Modelling, 2013,58(5): 1189-1205.
|
[7] |
SAMARATI P , VIMERCATI S D C D . Access control:policies,models,and mechanisms[C]// International School on Foundations of Security Analysis and Design. 2000: 137-196.
|
[8] |
CHEUNG H , YANG C ,et al. New smart-grid operation-based network access control[C]// The IEEE International Conference on Energy Conversion Congress and Exposition. 2015: 1203-1207.
|
[9] |
FERRAIOLO D F , SANDHU R , GAVRILA S ,et al. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001,4(3): 224-274.
|
[10] |
BERNABE B , RAMOS J , GOMEZ A F S ,et al. TACIoT:multidimensional trust-aware access control system for the Internet of Things[J]. Soft Computing, 2016,20(5): 1763-1779.
|
[11] |
GRANDISON T , SLOMAN M . A survey of trust in internet applications[J]. IEEE Communications Surveys & Tutorials, 2000,3(4): 2-16.
|
[12] |
封孝生, 刘德生, 乐俊 ,等. 临近空间信息资源访问控制策略初探[J]. 计算机应用研究, 2008,25(12): 3702-3704.
|
|
FENG X S , LIU D S , YUE J ,et al. Exploration on access control to near space information resources[J]. Application Research of Computers, 2008,25(12): 3702-3704.
|
[13] |
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7): 1214-1221.
|
[14] |
QI H , MA H , LI J ,et al. Access control model based on role and attribute and its applications on space-ground integration networks[C]// The IEEE International Conference on Computer Science and Network Technology. 2015: 1118-1122.
|
[15] |
KULKARNI D , TRIPATHI A . Context-aware role-based access control in pervasive computing systems[C]// The ACM Symposium on Access Control Models and Technologies. 2008: 113-122.
|
[16] |
李凤华, 王彦超, 殷丽华 ,等. 面向网络空间的访问控制模型[J]. 通信学报, 2016,37(5): 9-20.
|
|
LI F H , WANG Y C , YIN L H ,et al. Novel cyberspace-oriented access control model[J]. Journal on Communications, 2016,37(5): 9-20.
|
[17] |
DORNYEI Z . Motivational strategies in the language classroom[M]. Cambridge: Cambridge University PressPress, 2001.
|
[18] |
SANDHU R S , COYNE E J . Role-based access control models[J]. Computer, 1996,29(2): 38-47.
|