共 61 条
- [1] Zhang ZJ, Zhang YM, Xu XS, Et al., Manufacturing service composition self-adaptive approach based on dynamic matching network, Ruan Jian Xue Bao/Journal of Software, 29, 11, pp. 3355-3373, (2018)
- [2] Li ZW, Zhou MC., Modeling, Analysis and Deadlock Control of Automated Manufacturing Systems, (2009)
- [3] Liu GJ., Complexity of the deadlock problem for Petri nets modelling resource allocation systems, Information Sciences, 363, 10, pp. 190-197, (2016)
- [4] Wen YP, Liu JX, Dou WC, Et al., Privacy-aware multi-tenant access control for cloud workflow, Computer Integrated Manufactoring Systems, 25, 4, pp. 894-900, (2019)
- [5] Wang J, Han Y., Cloud workflow scheduling method with data privacy protection, Computer Integrated Manufactoring Systems, 19, 8, pp. 1859-1867, (2013)
- [6] Zhong RY, Xu X, Klotz E, Et al., Intelligent manufacturing in the context of industry 4.0: A review, Engineering, 3, 5, pp. 96-127, (2017)
- [7] Bertino E, Ferrari E, Atluri V., The specification and enforcement of authorization constraints in workflow management systems, ACM Trans. on Information System Security, 2, 2, pp. 65-104, (1999)
- [8] Crampton J, Khambhammettu H., Delegation and satisfiability in workflow systems, Proc. of the 13th ACM Symp. on Access Control Models and Technologies, pp. 31-40, (2008)
- [9] Basin D, Burri JS, Karjoth G., Obstruction-Free authorization enforcement: Aligning security and business objectives, Journal of Compter Security, 22, 5, pp. 661-698, (2014)
- [10] Zavatteri M, Vigano L., Last man standing: Static, decremental and dynamic resiliency via controller synthesis, Journal of Computer Security, 27, 3, pp. 343-373, (2019)