[1] Tolone W, Ahn G J, Pai T. Access system [J]. Journal of ACM Computing Surveys, 2005, 37(1): 29-41.[2] Barker S, Sergot M J, Wijesekera D. Status-based access control [J]. ACM Transactions on Information and System Security, 2008, 12(1): 1-47.[3] Han W, Xu M, Zhao W, et al. A trusted decentralized access control framework for the client/server architecture [J]. Journal of Network and Computer Applications, 2010, 33(2): 76-83.[4] Li Ninghui, Wang Qihua. Resiliency policies in access control[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2009: 113- 123.[5] Abassi R, El F S G. Towards a generic trust management model[C]//2012 19th International Conference on Telecommunications. Piscataway: IEEE Press, 2012: 1-6.[6] Ma Shunan, He Jingsha, Gao Feng. An access control model based on multi-factors trust [J]. Journal of Networks, 2012, 7(1): 173-178.[7] 王亮, 郭亚军. P2P系统中基于声誉的信任评估机制[J]. 计算机工程与应用, 2009, 45(15): 136- 138. Wang Liang, Guo Yajun. Reputation-based on trust evaluation mechanism for P2P system [J]. Computer Engineering and Applications, 2009, 45(15): 136-138.[8] 刘武, 段海新, 张洪, 等. TRBAC: 基于信任的访问控制模型[J]. 计算机研究与发展, 2011, 48(8): 1414-1420. Liu Wu, Duan Haixin, Zhang Hong, et al. TRBAC: trust based access control model [J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420.[9] Wang Xiao. A study of P2P access control strategy based on trust and security grade[C]//2011 International Conference on Computer Science and Service System. Washington D C: IEEE Computer Society, 2011: 126-128.[10] Feng Xiaosheng, Ge Bin, Sun Yang, et al. Enhancing role management in role-based access control[C]//2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology. Washington D C: IEEE Computer Society, 2010: 677-683.[11] Kabir M, Wang Hua, Bertino E. A role-involved purpose-based access control model [J]. Information Systems Frontiers, 2012, 14(3): 809-822. |