[1] Zhang Xinwen, Li Yingjiu, Nalla D. An Attribute-based Access Matrix Model[C]//Proceedings of 2005 ACM Symposium on Applied Computing. New Mexico, USA: ACM Press, 2005. [2] Yuan E, Tong Jin. Attributed Based Access Control(ABAC) for Web Services[C]//Proceedings of IEEE International Conference on Web Services. Washington D. C., USA: IEEE Press, 2005. [3] 王小明, 付 红, 张立臣. 基于属性的访问控制研究进 展[J]. 电子学报, 2010, 38(7): 1660-1667. [4] Damianou N, Dulay N, Lupu E, et al. The Ponder Policy Specification Language[C]//Proc. of Policy Workshop 2001. Bristol, UK: Springer-Verlag, 2001. [5] 王雅哲, 冯登国. 一种XACML规则冲突及冗余分析方 法[J]. 计算机学报, 2009, 32(3): 516-530. [6] Huang Feng, Huang Zhiqiu, Liu Linyuan. A DL-based Method for Access Control Policy Conflict Detecing[C]//Proceedings of the 1st Asia-Pacific Symposium on Internetware. New York, USA: ACM Press, 2009. [7] Davy S, Jennings B, Strassner J. The Policy Continuum——Policy Authoring and Conflict Analysis[J]. Computer Communications, 2008, 31(13): 2981-2995. [8] Calero J M, Pérez J M, Bernabé B J, et al. Detection of Semantic Conflict in Ontology and Rule-based Information Systems[J]. Data & Knowledge Engineering, 2010, 69(11): 1117-1137. [9] Campbell G A. Ontologies for Resolution Policy Definition and Policy Conflict Detection[R]. Technical Report: CSM- 1722007, University of Stirling, 2007. [10] Zhu Jian, Smari W W. Attribute Based Access Control and Security for Collaboration Environments[C]//Proceedings of NAECON’08. Dayton, USA: IEEE Press, 2008. [11] 李晓峰, 冯登国, 徐 震. 基于扩展XACML的策略管理[J]. 通信学报, 2007, 28(1): 103-110. 编辑 金胡考
|