共 50 条
- [41] An approach to programmable RDF-model transformations 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 150 - 157
- [42] Task-based access control model and its implementation Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2002, 30 (01):
- [43] A context-sensitive access control model and prototype implementation INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 341 - 350
- [44] Research and Implementation of a Four-Dimensional Access Control Model PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 817 - 821
- [45] Access Control Model Based on Role and Attribute and Its Implementation 2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 66 - 71
- [46] Fuzzy model-based control: A practical approach Computational Intelligence and Applications, 1999, : 261 - 266
- [47] A Practical Tuning Approach for Multivariable Model Predictive Control 2017 13TH IEEE INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2017, : 1107 - 1112
- [48] A Suggested Approach to Practical Unclamping of Model Predictive Control IFAC PAPERSONLINE, 2017, 50 (02): : 115 - 120
- [49] The hybrid model for web services security Access control and information flow control 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +
- [50] Security arguments for blind signatures in random oracle model Journal of Computational Information Systems, 2009, 5 (01): : 75 - 81