[1]徐光佑,史元春,谢伟凯.普适计算[J].计算机学报,2003,26(9):1024-1050.
[2]辛艳,罗长远,刘辉,等.基于上下文的普适计算角色访问控制模型[J].计算机工程与设计, 2010, 31(8):1693-1697.
[3]孙凌,辛艳,罗长远.基于扩展角色访问控制的普适计算访问控制模型[J].JOCA,2010, 30(4):1045-1047.
[4]姚寒冰,胡和平,李瑞轩.上下文感知的动态访问控制模型[J].计算机工程与科学,2007, 29(5):1-3.
[5]石伟丞,谭良,周明天.具有特征判断能力的使用控制模型研究[J].计算机科学,2010, 37(6):86-90.
[6]SANDHU R,PARK J. Usage control: A vision for next generation access control[C]//The second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security. Heidelberg: Springer-Verlag,2003:17-31.
[7]胡兆玮,靳瑞芳,于万钧,等.使用控制授权模型的逻辑定义研究[J].JOCA,2009,29(9):2360-2362.
[8]ZHANG XINWEN, SANDHU R, PARISI-PRESICCE F. Safety analysis of usage control authorization models[C]// ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2006: 243-254.
[9]郭亚军, 李蓉. 普适计算的访问控制研究[J].华中师范大学学报:自然科学版,2006,40(4): 504-506.
[10]PARK J, SANDHU R. Towards usage control models: Beyond traditional access control [C]// SACMATr'02: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2002: 57-64.
[11]PARK J, SANDHU R. The UCONABC usage control model [J]. ACM Transactions on Information and System Security, 2004,7(1):128-174.
[12]ZHAO BAOXIAN, SANDHU R, ZHANG XINWEN, et al. Toward a times-based usage control model [C]// Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Berlin: Springer-Verlag, 2007: 227-242.
[13]ZHANG XINWEN, NAKAE M, COVINGTON M J. Toward a usage-based security framework for collaborative computing systems[J]. ACM Transactions on Information and System Security, 2008, 11(1):1-36. |