[1] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-168.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications, 2016,37(11): 156-168.
|
[2] |
徐振亚 . 一种基于SOA架构的统一身份认证系统的研究及实现[D]. 上海:上海交通大学, 2007.
|
|
XU Z Y . Research and implementation of a unified identity authentication system based on SOA architecture and implementation[D]. Shanghai :Shanghai Jiao Tong University, 2007.
|
[3] |
刘雪晖, 尹超, 何彦 ,等. 网络化制造集成平台集中式身份认证策略研究[J]. 计算机集成制造系统, 2005,11(6): 885-890.
|
|
LIU X H , YIN C , HE Y ,et al. Centralized identity authentication strategy in networked manufacturing integrated platform[J]. Computer Integrated Manufacturing Systems, 2005,11(6): 885-890.
|
[4] |
孙超, 陈钢 . 基于 Agent 技术的统一身份认证系统[J]. 计算机应用研究, 2005,22(3): 138-140.
|
|
SUN C , CHEN G . Uniform identity authentication system based on Agent technologies[J]. Application Research of Computers, 2005,22(3): 138-140.
|
[5] |
顾少慰, 梁洪亮, 李尚杰 ,等. 一种增强的自主访问控制机制的设计和实现[J]. 计算机工程与设计, 2007,28(8): 1781-1784.
|
|
GU S W , LIANG H L , LI S J ,et al. Design and implementation of enhanced discretionary access control mechanism[J]. Computer Engineering and Design, 2007,28(8): 1781-1784.
|
[6] |
李立新, 陈伟民, 黄尚廉 . 强制访问控制在基于角色的安全系统中的实现[J]. 软件学报, 2000,11(10): 1320-1325.
|
|
LI L X , CHEN W M , HUANG S L . Realizing mandatory access control in role-based security system[J]. Journal of Software, 2000,11(10): 1320-1325.
|
[7] |
李孟珂, 余祥宣 . 基于角色的访问控制技术及应用[J]. 计算机应用研究, 2000,17(10): 44-47.
|
|
LI M K , YU X X . Technique and application of role-based access control[J]. Application Research of Computer, 2000,17(10): 44-47.
|
[8] |
王迎 . 统一身份认证在企业信息化中的应用研究[J]. 计算机光盘软件与应用, 2015(2): 109-110.
|
|
WANG Y . Application of unified authentication in enterprise informationization[J]. Computer CD Software and Applications, 2015(2): 109-110.
|
[9] |
孔强, 李学农, 伊里 . 用户集中管理和访问控制系统的设计实现[J]. 计算机应用与软件, 2007,24(2): 75-78.
|
|
KONG Q , LI X N , YI L . Design and implementation of a principal integrated administration and access control system[J]. Computer Applications and Software, 2007,24(2): 75-78.
|
[10] |
WULLEMS C , POZZOBON O , KUBIK K . Signal authentication and integrity schemes for next generation global navigation satellite systems[C]// European Navigation Conference. 2005:1.
|
[11] |
马康, 陈松政 . 基于密码的访问控制研究[J]. 计算机应用研究, 2012,29(1): 305-307.
|
|
MA K , CHEN S Z . Research on cryptography based access control[J]. Application Research of Computers, 2012,29(1): 305-307.
|
[12] |
王永涛 . 基于身份的密码体制的密钥管理方案研究[D]. 成都:西华大学, 2007.
|
|
WANG Y T . Research on key management scheme of identity - based cryptosystem[D]. Chengdu:Xihua University, 2007.
|
[13] |
李凤华, 王彦超, 殷丽华 ,等. 面向网络空间的访问控制模型[J]. 通信学报, 2016,37(5): 9-20.
|
|
LI F H , WANG Y C , YIN L H ,et al. Novel cyberspace-oriented access control model[J]. Journal on Communications, 2016,37(5): 9-20.
|