[1] 罗霄峰,王文贤,罗万伯.访问控制技术现状及展望[J].信息网络安全,2016(12):19-27.(LUO X F, WANG W X, LUO W B. The retrospect and prospect of access control technology[J]. Netinfo Security, 2016(12):19-27.) [2] BELTRAN V, SKARMETA A F. Overview of device access control in the IoT and its challenges[J]. IEEE Communications Magazine, 2019, 57(1):154-160. [3] KOLLURU K K, PANIAGUA C, VAN DEVENTER J, et al. An AAA solution for securing industrial IoT devices using next generation access control[C]//Proceedings of the 2018 IEEE Industrial Cyber-Physical Systems. Piscataway:IEEE, 2018:737-742. [4] GUO H, MEAMARI E, SHEN C-C. Multi-authority attribute-based access control with smart contract[C]//Proceedings of the 2019 International Conference on Blockchain Technology. New York:ACM, 2019:6-11. [5] OASIS. eXtensible Access Control Markup Language (XACML) version 3.0 plus errata 01[EB/OL].[2019-01-06]. http://docs.oasis-open.org/xacml/3.0/errata01/os/xacml-3.0-core-spec-errata01-os-complete.pdf. [6] International Committee for Information Technology Standards. For information technology-next generation access control-functional architecture:INCITS 499-2018[S]. New York:American National Standards Institute, 2018. [7] International Committee for Information Technology Standards. For information technology-next generation access control-generic operations and data structures:INCITS 526-2016[S]. New York:American National Standards Institute, 2016. [8] NGO C, DEMCHENKO Y, de LAAT C. Decision diagrams for XACML policy evaluation and management[J]. Computers and Security, 2015, 49:1-16. [9] 房梁,殷丽华,郭云川,等.基于属性的访问控制关键技术研究综述[J].计算机学报,2017,40(7):1680-1698.(FANG L, YIN L H, GUO Y C, et al. A survey of key technologies in attribute-based access control scheme[J]. Chinese Journal of Computers, 2017, 40(7):1680-1698.) [10] KAVANAGH K, CONTU R. Market trends:cloud-based security services market, worldwide, 2014[EB/OL].[2019-02-08]. https://www.gartner.com/en/documents/2607617/market-trends-cloud-based-security-services-market-world. [11] FUJITA M, MCGEER P C, YANG J C-Y. Multi-terminal binary decision diagrams:an efficient data structure for matrix representation[J]. Formal Methods in System Design, 1997, 10(2/3):149-169. [12] FISLER K, KRISHNAMURTHI S, MEYEROVICH L A, et al. Verification and change-impact analysis of access-control policies[C]//Proceedings of the 27th International Conference on Software Engineering. New York:ACM, 2005:196-205. [13] LIU A X, CHEN F, HWANG J, et al. Designing fast and scalable XACML policy evaluation engines[J]. IEEE Transactions on Computers, 2011, 60(12):1802-1817. [14] ROS S P, LISCHKA M, MÁRMOL F G. Graph-based XACML evaluation[C]//Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. New York:ACM, 2012:83-92. [15] MAROUF S, SHEHAB M, SQUICCIARINI A, et al. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation[J]. IEEE Transactions on Services Computing, 2011, 4(4):300-313. [16] 戚湧,陈俊,李千目.一种基于重排序的XACML策略评估优化方法[J].南京理工大学学报(自然科学版),2015,39(2):187-193.(QI Y, CHEN J, LI Q M. XACML policy evaluation optimization method based on reordering[J]. Journal of Nanjing University of Science and Technology (Natural Science Edition), 2015, 39(2):187-193.) [17] RAO P, LIN D, BERTINO E, et al. Fine-grained integration of access control policies[J]. Computers and Security, 2011, 30(2/3):91-107. [18] 罗霄峰,罗万伯.改进的安全策略评价管理决策图[J].四川大学学报(工程科学版),2016,48(4):123-128,210.(LUO X F, LUO W B. Improved decision diagrams for security policy evaluation and management[J]. Journal of Sichuan University (Engineering Science Edition), 2016, 48(4):123-128, 210.) [19] BISWAS P, SANDHU R, KRISHNAN R. Label-based access control:an ABAC model with enumerated authorization policy[C]//Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. New York:ACM, 2016:1-12. [20] GUPTA M, PATWA F, SANDHU R. An attribute-based access control model for secure big data processing in Hadoop ecosystem[C]//Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control. New York:ACM, 2018:13-24. [21] 罗霄峰,罗万伯.基于iX-MIDD的XACML安全策略评估[J].通信技术,2016,49(5):627-631.(LUO X F, LUO W B. XACML policy evaluation based on iX-MIDD[J]. Communications Technology, 2016, 49(5):627-631.) |