[1] 杨健,汪海航,王剑,等.云计算安全问题研究综述[J].小型微型计算机系统,2012,33(3):472-479.(YANG J, WANG H H, WANG J, et al. Survey on some security issues of cloud computing[J]. Journal of Chinese Computer Systems, 2012, 33(3):472-479.) [2] ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing[J]. Communications of the ACM, 2010, 53(5):50-58. [3] 陈华山,皮兰,刘峰,等.网络空间安全科学基础的研究前沿及发展趋势[J].信息网络安全,2015(3):1-5.(CHEN H S, PI L, LIU F, et al. Research on frontier and trends of science of cybersecurity[J]. Netinfo Security, 2015(3):1-5.) [4] American National Standard Institute. ANSI INCITS 359-2004, American national standard for information technology-role based access control[S]. New York:American National Standards Institute, 2004. [5] SCHEFER-WENZL S, STREMBECK M. Modeling context-aware RBAC models for business processes in ubiquitous computing environments[C]//Proceedings of the 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing. Piscataway, NJ:IEEE, 2012:126-131. [6] YAN D, TIAN Y, HUANG J, et al. Privacy-aware RBAC model for Web services composition[J]. The Journal of China Universities of Posts and Telecommunications, 2013, 20(S1):30-34. [7] LI W, WAN H, REN X, et al. A refined RBAC model for cloud computing[C]//Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science. Piscataway, NJ:IEEE, 2012:43-48. [8] 叶春晓,郭东恒.多域环境下安全互操作研究[J].计算机应用,2012,32(12):3422-3425.(YE C X, GUO D H. Research on secure interoperation in multi-domain environment[J]. Journal of Computer Applications, 2012, 32(12):3422-3425.) [9] MIGLIAVACCA M, PAPAGIANNIS I, EYERS D M, et al. Distributed middleware enforcement of event flow security policy[C]//Proceedings of the 2010 ACM/IFIP/USENIX 11th International Conference on Middleware. Berlin:Springer, 2010:334-354. [10] TAKABI H, JOSHI J B D, AHN G J. Security and privacy challenges in cloud computing environments[J]. IEEE Security & Privacy, 2010, 8(6):24-31. [11] 邹德清,邹永强,羌卫中,等.网格安全互操作及其应用研究[J].计算机学报,2010,33(3):514-525.(ZOU D Q, ZOU Y Q, QIANG W Z, et al. Grid security interoperation and its application[J]. Chinese Journal of Computers, 2010, 33(3):514-525.) [12] KAPADIA A, AL-MUHTADI J, ROY C, et al. IRBAC 2000:secure interoperability using dynamic role translation[R]. Champaign, IL:University of Illinois at Urbana-Champaign, 1999:1-7. [13] AL-MUHTADI J, KAPADIA A, CAMPBELL R, et al. The A-IRBAC 2000 model:administrative interoperable role-based access control[R]. Champaign, IL:University of Illinois at Urbana-Champaign, 2000:1-9. [14] HU V C, KUHN D R, XIE T. Property verification for generic access control models[C]//EUC'08:Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Piscataway, NJ:IEEE, 2008, 2:243-250. [15] BRYANS J W, FITZGERALD J S. Formal Engineering of XACML Access Control Policies in VDM++[M]. Berlin:Springer, 2007:1-23. [16] HU V C, KUHN D R, XIE T, et al. Model checking for verification of mandatory access control models and properties[J]. International Journal of Software Engineering and Knowledge Engineering, 2011, 21(1):103-127. [17] HWANG J H, XIE T, HU V, et al. ACPT:a tool for modeling and verifying access control policies[C]//Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks. Piscataway, NJ:IEEE, 2010:40-43. [18] HWANG J H, ALTUNAY M, XIE T, et al. Model checking grid policies[EB/OL].[2015-11-28]. http://hwang250.googlecode.com/. [19] SHAFIQ B, JOSHI J B D, BERTINO E, et al. Secure interoperation in a multidomain environment employing RBAC policies[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(11):1557-1577. [20] CLARKE E M, EMERSON E A. Design and synthesis of synchronization skeletons using branching time temporal logic[M]//25 Years of Model Checking. Berlin:Springer, 2008:196-215. [21] HOLZMANN G J. The model checker SPIN[J]. IEEE Transactions on Software Engineering, 1997, 23(5):279-295. [22] CIMATTI A, CLARKE E, GIUNCHIGLIA F, et al. NuSMV:a new symbolic model checker[J]. International Journal on Software Tools for Technology Transfer, 2000, 2(4):410-425. [23] BERHMANN G, DAVID A, LARSEN K G. A tutorial on UPPAAL[M]//Formal Methods for the Design of Real-Time Systems. Berlin:Springer, 2004:200-236. [24] PAPADIMITRIOU C, SIDERI M. On the Floyd-Warshall algorithm for logic programs[J]. Journal of Logic Programming, 1999, 41(1):129-137. [25] HERB S, ANDREI A. Boost C++ libraries 1.58.0[EB/OL].[2015-04-17]. http://www.boost.org/. |