[1] 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.(ZHANG Y Q, WANG X F, LIU X F, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6):1328-1348.) [2] 李昊,张敏,冯登国,等.大数据访问控制研究[J].计算机学报,2017,40(1):72-91.(LI H, ZHANG M, FENG D G, et al. Research on access control of big data[J]. Chinese Journal of Computers, 2017, 40(1):72-91.) [3] DÍAZ-LÓPEZ D, DÓLERA-TORMO G, GÓMEZ-MÁRMOL F, et al. Dynamic counter-measures for risk-based access control systems:an evolutive approach[J]. Future Generation Computer Systems, 2016, 55(C):321-335. [4] CHENG P C, ROHATGI P, KESER C, et al. Fuzzy multi-level security:an experiment on quantified risk-adaptive access control[C]//SP'07:Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2007:222-230. [5] NI Q, BERTINO E, LOBO J. Risk-based access control systems built on fuzzy inferences[C]//ASIACCS'10:Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2010:250-260. [6] LAKSHMI H, NAMITHA S, SEEMANTHINI, et al. Risk based access control in cloud computing[C]//ICGCIoT 2015:Proceedings of the 2015 International Conference on Green Computing and Internet of Things. Piscataway, NJ:IEEE, 2015:1502-1505. [7] BOUCHAMI A, GOETTELMANN E, PERRIN O, et al. Enhancing access-control with risk-metrics for collaboration on social cloud-platforms[C]//TRUSTCOM 2015:Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA. Piscataway, NJ:IEEE, 2015:864-871. [8] CHEN A, XING H W, SHE K, et al. A dynamic risk-based access control model for cloud computing[C]//Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom). Piscataway, NJ:IEEE, 2016:579-584. [9] 匡亚岚.云环境下数据安全存储技术的研究与实现[D].成都:电子科技大学,2016:35-45.(KUANG Y L. Research and implementation of data security storage technology in cloud environment[D]. Chengdu:University of Electronic Science and Technology of China, 2016:35-45.) [10] RAY I, RAY I. Trust-based access control for secure cloud computing[EB/OL].[2017-11-16]. http://www.docin.com/p-1156555483.html. [11] 陆悠,罗军舟,李伟,等.面向网络状态的自适应用户行为评估方法[J].通信学报,2013,34(7):71-80.(LU Y, LUO J Z, LI W, et al. Adaptive user behavior's evaluation method based on network status[J]. Journal on Communications, 2013, 34(7):71-80.) [12] 周丽.基于模糊灰色关联分析的信息安全风险评估模型研究[D].重庆:西南大学,2013:17-33.(ZHOU L. Research on information security risk assessment model based on fuzzy grey relational analysis[D]. Chongqing:Southwest University, 2013:17-33.) [13] 熊金石,秦洪涛,李建华,等.基于信息熵的安全风险评估指标权重确定方法[J].系统科学学报,2013,21(2):82-84,89.(XIONG J S, QIN H T, LI J H, et al. Method of determining index weight in security risk evaluation based on information entropy[J]. Journal of System Science, 2013, 21(2):82-84, 89.) [14] 方开泰,王东谦,吴国富.一类带约束的回归——配方回归[J].计算数学,1982,4(1):57-69.(FANG K T, WANG D Q, WU G F. A class of constrainted regression - programming regression[J]. Mathematica Numerica Sinica, 1982, 4(1):57-69.) [15] ALUVALU R K, MUDDANA L. A Dynamic Attribute-based Risk Aware Access Control model (DA-RAAC) for cloud computing[C]//ICCIC 2016:Proceedings of the 2016 IEEE International Conference on Computational Intelligence and Computing Research. Piscataway, NJ:IEEE, 2016:1-5. |