[1] |
BUGLIESI M , COLAZZO D , CRAFA S , et al. A type system for discretionary access control[J]. Periodical, 2009,19(4): 839-875.
|
[2] |
XU L , ZHANG H Q , DU X H , et al. Research on mandatory access control model for application system[C]//The International Con-ference on Networks Security,Wireless Communications and Trusted Computing. Periodical, c2009:159-163.
|
[3] |
SANDHU R , COYNE E , FEINSTEIN H , et al. Role-based access control models[J]. IEEE Computer, 1996,29(2): 38-47.
|
[4] |
WANG G J , LIU Q , WU J . Hierarchical attribute-based encryption for fine-grained access control in cloud storage services[C]//The 17th ACM Conference on Computer and Communications Security. c2010:735-737.
|
[5] |
李凤华, 苏铓, 史国振, 等. 访问控制模型研究进展及发展趋势[J]. 电子学报, 2012,40(4): 806-813.
|
|
LI F H , SU M , SHI G Z , et al. Research status and development trends of access control model[J]. Acta Electronica Sinica, 2012,40(4): 806-813.
|
[6] |
AKL S G . Cryptographic solution to a problem of access control in a hierarchy[J]. ACM Transactions on Computer Systems, 1983.
|
[7] |
HARN L , LIN H Y . A cryptographic key generation scheme for multilevel data security[J]. Computers and Security, 1990.
|
[8] |
HWANG M S , YANG W P . Controlling access in large partially ordered hierarchies using cryptographic keys[J]. The Journal of Systems and Software, 2003.
|
[9] |
LO J W , HWANG M S , LIU C H . An efficient key assignment scheme for access control in a large leaf class hierarchy[J]. Infor-mation Sciences, 2010(4).
|
[10] |
程芳权, 彭智勇, 宋伟, 等. 可信云存储环境下支持访问控制的密钥管理[J]. 计算机研究与发展, 2013,8: 1613-1627.
|
|
CHENG F Q , PENG Z Y , SONG W , et al. Key management for ac-cess control in trusted cloud storages[J]. Journal of Computer Re-search and Development, 2013,8: 1613-1627.
|
[11] |
吕智泉, 张敏, 冯登国 . 云存储密文访问控制方案[J]. 计算机科学与探索, 2011,5(9): 836-844.
|
|
LV Z Q , ZHANG M , FENG D G . Cryptographic access control scheme for cloud storage[J]. Journal of Frontiers of Computer Science & Technology, 2011,5(9): 836-844.
|
[12] |
熊厚仁, 陈性元, 张斌, 等. 基于双层角色和组织的可扩展访问控制模型[J]. 电子与信息学报, 2015,7: 1612-1619.
|
|
XIONG H R , CHEN X Y , ZHANG B , et al. Scalable access control model based on double-tier role and organization[J]. Journal of Electronics & Information Technology, 2015,7: 1612-1619.
|
[13] |
李怀明, 王慧佳, 符林 . 基于组织的 Web 服务访问控制模型[J]. 计算机工程, 2014,11: 65-70.
|
|
LI H M , WANG H J , FU L . Organization-based access control model for Web service[J]. Computer Engineering, 2014,11: 65-70.
|
[14] |
熊智, 王平, 徐江燕, 等. 一种基于属性的企业云存储访问控制方案[J]. 计算机应用研究, 2013,2: 513-517.
|
|
XIONG Z , WANG P , XU J Y , et al. Attribute based access control strategy for enterprise cloud storage[J]. Application Research of Computers, 2013,2: 513-517.
|
[15] |
王小威, 赵一鸣 . 一种基于任务角色的云计算访问控制模型[J]. 计算机工程, 2012,24: 9-13.
|
|
WANG X W , ZHAO Y M . A task-role-based access control model for cloud computing[J]. Computer Engineering, 2012,24: 9-13.
|
[16] |
池亚平, 王艳, 王慧丽, 等. 基于等级的电子政务云跨域访问控制技术[J]. 计算机应用, 2016,2: 402-407.
|
|
CHI Y P , WANG Y , WANG H L , et al. Cross-domain access control for e-government cloud based on classification[J]. Journal of Com-puter Applications, 2016,2: 402-407.
|
[17] |
郝小龙 . 改进的RBAC模型在电网视频监控平台中的应用[J]. 计算机技术与发展, 2014,12: 212-215.
|
|
HAO X L . Application of improved RBAC model in grid video moni-toring platform[J]. Computer Technology and Development, 2014,12: 212-215.
|