[1]朱贤,邢光林,洪帆.分布式环境下的访问控制综述[J]. 微型机与应用,2005,24(1): 4-7.[2]马晓宁,冯志勇,徐超. Web服务中跨安全域的基于信任的访问控制模型[J]. 计算机应用研究,2009,26(12):4571-4573.[3]汪应龙,胡金柱.自动信任协商中一种策略一致性管理方法[J].计算机应用, 2008,28(7):1795-1797.[4]WINSBOROUGH W H, SEAMONS K E, JONES V E. Automated trust negotiation [C]// Proceedings of DARPA Information Survivability Conference and Exposition. Piscataway, NJ: IEEE Press, 2000: 88-102.[5]FERRALL S. RFC3281, An Internet attribute certificate profile for authorization[S], 2000.[6]戴常英,张会娟.基于信任度的Web服务跨域访问控制[J]. 计算机工程与科学,2009,31(8): 42-45.[7]LI N H, DU W, BONEH D. Oblivious signature-based envelope[C]// Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 2003: 182-189.[8]卢超,卢炎生,谢晓东,等.一种基于依赖分析的并发程序潜在死锁检测算法[J]. 小型微型计算机系统,2007,28(5): 841-844.[9]RFC2459, Internet X.509 public key infrastructure certificate and CRL profile[S], 2000.[10]夏冬梅,曾国荪,陈波,等.基于标签树的自动信任协商策略分析[J]. 计算机科学,2009,36(12): 154-158.[11]YU T, WINSLETT M. A unified scheme for resource protection in automated trust negotiation[C]// Proceedings of the 2003 Symposium on Security and Privacy. Piscataway, NJ: IEEE Press,2003: 245-257.[12]李建欣,怀进鹏. COTN:基于契约的信任协商系统[J]. 计算机学报,2006,29(8): 1290-1330.[13]WINSBOROUGH W H, LI N H. Protecting sensitive attributes in automated trust negotiation[C]// Proceedings of the ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2002:41-51.[14]YU T, WINSLETT M, SEAMONS K E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation[J]. ACM Transactions on Information and System Security, 2003,6(1):1-42.[15]杨秀文,严尚安,曾顺鹏,等.关于可达矩阵的求法探讨[J].数学的实践与认识,2003,33(11):128-130.[16]方世昌.离散数学[M]. 2版. 西安: 西安电子科技大学出版社, 2006: 87-100,266-267. |