[1]ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing[J]. Communications of the ACM, 2010, 53(4): 50-58.[2]陈全,邓倩妮. 云计算及其关键技术[J]. 计算机应用, 2009, 29(9): 2562-2567.[3]汤帜,仇睿恒,王毅. CEBX:新一代结构化版式文档技术[J]. 北京信息科技大学学报, 2010, 25(Z2):11-15.[4]WEI X, CROFT W B. LDA-based document models for Ad-Hoc retrieval[C]// Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM Press, 2006: 178-185.[5]DENG H B, KING I, LYU M R. Enhanced models for expertise retrieval using community-aware strategies[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 2012, 42(1): 93-106.[6]ZHENG S Y, LIU J. A secure confidential document model and its application[C]// Proceedings of the 2010 International Conference on Multimedia Information Networking and Security. Washington, DC: IEEE Computer Society, 2010: 516-519.[7]PICHLER C, HUEMER C. WIMMER M. Business document interoperability as a service[C]// Proceedings of the 6th International Symposium on Service Oriented System Engineering. Washington, DC: IEEE Computer Society, 2011:318-326.[8]LIEGL P, HUEMER C, PICHLER C. Registry support for core component-based business document models[J]. Service Oriented Computing and Applications, 2011, 5(3): 183-202.[9]BOLL S, KLAS W. ZYX-A multimedia document model for reuse and adaptation of multimedia content[J]. IEEE Transactions on Knowledge and Data Engineering, 2001, 13(3): 361-382.[10]TRAN N A T, DANG T K. An extended video database model for supporting finer-grained multi-policy and multi-level access controls[J]. Polibits, 2008, 38: 49-62.[11]BALINSKY H, SIMSKE S J. Secure document engineering[C]// Proceedings of the 11th ACM Symposium on Document Engineering. New York: ACM Press, 2011: 269-272.[12]ALHAQBANI B, FIDGE C. Access control requirements for processing electronic health records[C]// Proceedings of the 2007 International Workshops on Business Process Management,LNCS 4928. Berlin: Springer, 2008:371-382.[13]熊金波,姚志强,马建峰,等. 视频数据库多级访问控制[J]. 通信学报,2012,33(8):147-154.[14]CHANG C C, CHENG M S, HSU P Y. Effective storage structure for multi-version XML documents[C]// Proceedings of the Second International Conference on Future Generation Information Technology. Berlin: Springer, LNCS 6485, 2010:249-266.[15]BERSTEL J, BOASSON L. Formal properties of XML grammars and languages[J]. ACTA Informatica. 2002, 38(9): 649-671.[16]吴洁明,范国梅. 基于XML的标准符合性测试方案[J].计算机应用,2012, 32(2):551-553.[17]李凤华,苏铓,史国振,等.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813.[18]李风华,王巍,马建峰,等. 基于行为的访问控制模型及其行为管理[J]. 电子学报, 2008,36(10):1881-1890. |