共 19 条
- [1] Feng D.G., Zhang M., Zhang Y., Xu Z., Study on cloud computing security, Ruan Jian Xue Bao/Journal of Software, 22, 1, pp. 71-83, (2011)
- [2] Lin C., Su W.B., Meng K., Liu Q., Liu W.D., Cloud computing security: Architecture, mechanism and modeling, Chinese Journal of Computers, 36, 9, pp. 1765-1784, (2013)
- [3] Moses T., Extensible Access Control Markup Language (XACML) Version 2.0, (2005)
- [4] Ribeiro C., Zuquete A., Ferreira P., Guedes P., SPL: An access control language for security policies with complex constraints, Proc. of the Network and Distributed System Security Symp, pp. 89-107, (2001)
- [5] Damianou N., Dulay N., Lupu E., Sloman M., The ponder policy specification language, Proc. of the Workshop on Policies for Distributed Systems and Networks (Policy 2001), pp. 18-38, (2001)
- [6] Li N.H., Mitchell J.C., Winsborough W.H., Design of a role-based trust-management framework, Proc. of the IEEE Symp. on Security and Privacy, pp. 114-130, (2002)
- [7] Han W.L., Lei C., A survey on policy languages in network and security management, Computer Networks, 56, 1, pp. 477-489, (2012)
- [8] Ferraolo D., Kuhn R., Role-based access control, Proc. of the 15th National Computer Security Conf, pp. 554-563, (1992)
- [9] Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E., Role-based access control models, Computer, 29, 2, pp. 38-47, (1996)
- [10] Bao Y.B., Yin L.H., Fang B.X., Guo L., Approach of security policy expression and verification based on well-founded semantic, Ruan Jian Xue Bao/Journal of Software, 23, 4, pp. 912-927, (2012)