[1] BERTINO E, LORENZO D, PACI F, et al. Security for Web service and service-oriented architectures [M]. Berlin: Springer, 2010: 166-177. [2] DAVID F, RAVI S, SERBAN G. Proposed NIST standard for role-based access control [J]. ACM Transactions on Information and System Security, 2003, 4(3): 224-274. [3] CIRIO L, CRUZ I F, TAMASSIA R. A role and attribute based access control system using semantic Web technologies [C]//Proceedings of the 2007 OTM Confederated International Workshops and Posters on the Move to Meaningful Internet Systems, LNCS 4806. Berlin: Springer, 2007: 1256-1266. [4] CRUZ I F, GJOMEMO R, LIN B, et al. A constraint and attribute based security framework for dynamic role assignment in collaborative environments [C]//Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing. Berlin: Springer, 2013: 322-339. [5] SHEN H. A semantic-aware attribute-based access control model for Web services [C]//ICA3PP 2009: Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, LNCS 5574. Berlin: Springer, 2009: 693-703. [6] PRIEBE T, DOBMEIER W, SCHLÄGER C, et al. Supporting attribute-based access control in authorization and authentication infrastructures with ontologies [J]. Journal of Software, 2009, 2(1): 27-38. [7] OASIS. Extensible access control markup language [EB/OL]. [2015-03-10]. http://docs.oasis-open.org/xacml/2.0. [8] BHATTI R, BERTINO E, GHAFOOR A, et al. XML-based specification for Web services document security [J]. IEEE Computer, 2004, 37(4): 41-49. [9] WEI Z Q, KANG M J, JIA D N, et al. Research on privacy-protection policy for pervasive computing [J]. Chinese Journal of Computers, 2010, 33(1):128-138. (魏志强,康密军,贾东宁,等.普适计算隐私保护策略研究[J].计算机学报,2010,33(1):128-138) [10] DOUGHERTY D J, FISLER K, KRISHNAMURTHI S. Specifying and reasoning about dynamic access-control policies [C]//IJCAR 2006: Proceedings of the 3rd International Joint Conference on Automated Reasoning, LNCS 4130. Berlin: Springer, 2006: 632-646. [11] USZOK A, BRADSHAW J M, LOTT J, et al. New developments in ontology-based policy management: increasing the practicality and comprehensiveness of KAoS [C]//POLICY 2008: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks. Piscataway: IEEE, 2008: 145-152. [12] ZHAO C, HEILILI N, LIU S, et al. Representation and reasoning on RBAC: a description logic approach [C]//ICTAC'05: Proceedings of the Second international conference on Theoretical Aspects of Computing, LNCS 3722. Berlin: Springer, 2007: 381-393. [13] CHAE J H, SHIRI N. Formalization of RBAC policy with object class hierarchy [C]//ISPEC 2007: Proceedings of the Third International Conference on Information Security Practice and Experience, LNCS 4464. Berlin: Springer, 2008: 162-176. [14] SAZIO M, CAPRETZ M A M. Web service semantic access control [C]//INTECH 2013: Proceedings of the 3rd International Conference on Innovative Computing Technology. Piscataway: IEEE, 2013: 77-82. [15] TONINELLI A, MONTANARI R, KAGAL L, et al. A semantic context-aware access control framework for secure collaborations in pervasive computing environments [C]//ISWC 2010: Proceedings of the 5th International Semantic Web Conference, LNCS 4273. Berlin: Springer, 2010: 473-486. |