1 |
郑宇.城市知识体系[J].武汉大学学报(信息科学版), 2023, 48(1): 1-16.
|
|
ZHENG Y. The knowledge system for intelligent cities [J]. Geomatics and Information Science of Wuhan University, 2023, 48(1): 1-16.
|
2 |
王龙,王娜,李辉,等.内部横向视角下政府数据跨部门协同治理的过程分析[J].电子政务, 2023(5): 76-87.
|
|
WANG L, WANG N, LI H, et al. Process analysis of cross-sectoral collaborative governance of government data from an internal horizontal perspective [J]. E-Government, 2023(5): 76-87.
|
3 |
FERRAIOLO D, SANDHU R, GAVRILA S, et al. Proposed NIST standard for role-based access control [J]. ACM Transactions on Information and System Security, 2001, 4(3): 224-274.
|
4 |
HU V C, FERRAIOLO D, KUHN R, et al. Guide to Attribute Based Access Control (ABAC) definition and considerations [R/OL]. [2024-07-30]. .
|
5 |
马海英,李金舟,杨及坤.基于区块链可撤销属性的去中心化属性基加密方案[J].计算机应用, 2023, 43(9): 2789-2797.
|
|
MA H Y, LI J Z, YANG J K. Blockchain-based decentralized attribute-based encryption scheme for revocable attributes [J]. Journal of Computer Applications, 2023, 43(9): 2789-2797.
|
6 |
林莉,毛新雅,储振兴,等.混合云环境下面向数据生命周期的自适应访问控制[J].软件学报, 2024, 35(3): 1357-1376.
|
|
LIN L, MAO X Y, CHU Z X, et al. Adaptive access control oriented to data life cycle in hybrid cloud environment [J]. Journal of Software, 2024, 35(3): 1357-1376.
|
7 |
SANDHU R, BHAMIDIPATI V, MUNAWER Q. The ARBAC97 model for role-based administration of roles [J]. ACM Transactions on Information and System Security, 1999, 2(1): 105-135.
|
8 |
郁宁,王高才.基于可信期望的跨域访问安全性研究[J].计算机应用研究, 2020, 37(11): 3406-3410.
|
|
YU N, WANG G C. Study on cross-domain access security based on trusted expectations [J]. Application Research of Computers, 2020, 37(11): 3406-3410.
|
9 |
陈美宏,袁凌云,夏桐.基于主从多链的数据分类分级访问控制模型[J].计算机应用, 2024, 44(4): 1148-1157.
|
|
CHEN M H, YUAN L Y, XIA T. Data classification and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
10 |
钟奇.一种基于区域的权限控制模型研究及应用[D].北京:北京邮电大学, 2018: 18-24.
|
|
ZHONG Q. Research and implementation of an access control model based on region [D]. Beijing: Beijing University of Posts and Telecommunications, 2018: 18-24.
|
11 |
BARKHA P, SAHANI G. Analysis of various RBAC and ABAC based access control models with their extension [J]. International Journal of Engineering Development and Research, 2017, 5(2): 487-492.
|
12 |
葛丽娜,胡雨谷,张桂芬,等.云计算环境基于客体属性匹配的逆向混合访问控制方案[J].计算机应用, 2021, 41(6): 1604-1610.
|
|
GE L N, HU Y G, ZHANG G F, et al. Reverse hybrid access control scheme based on object attribute matching in cloud computing environment [J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
13 |
刘炜,盛朝阳,佘维,等.基于智能合约的分类分级属性访问控制方法[J].计算机应用研究, 2022, 39(5): 1313-1318.
|
|
LIU W, SHENG Z Y, SHE W, et al. Classified and hierarchical attribute access control method based on smart contract [J]. Application Research of Computers, 2022, 39(5): 1313-1318.
|
14 |
FERRAIOLO D, CHANDRAMOULI R, HU V, et al. A comparison of Attribute Based Access Control (ABAC) standards for data service applications [R/OL]. [2024-07-30]. .
|
15 |
GOYAL V, OMKANT P, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98.
|
16 |
OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryption with non-monotonic access structures [C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 195-203.
|
17 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334.
|
18 |
熊厚仁,陈性元,张斌,等.基于双层角色和组织的可扩展访问控制模型[J].电子与信息学报, 2015, 37(7): 1612-1619.
|
|
XIONG H R, CHEN X Y, ZHANG B, et al. Scalable access control model based on double-tier role and organization [J]. Journal of Electronics and Information Technology, 2015, 37(7): 1612-1619.
|
19 |
刘芹,李鹏举,余纯武.云计算中属性基数据与权限混合访问控制方案[J].计算机工程与应用, 2024, 60(13): 276-286.
|
|
LIU Q, LI P J, YU C W. Attribute-based data and privilege hybrid access control scheme in cloud computing [J]. Computer Engineering and Applications, 2024, 60(13): 276-286.
|
20 |
苏秋月,陈兴蜀,罗永刚.大数据环境下多源异构数据的访问控制模型[J].网络与信息安全学报, 2019, 5(1): 78-86.
|
|
SU Q Y, CHEN X S, LUO Y G. Access control model for multi-source heterogeneous data in big data environment [J]. Chinese Journal of Network and Information Security, 2019, 5(1): 78-86.
|