参考文献
[1] 沈海波, 洪 帆. 访问控制模型研究综述[J]. 计算机应用研究, 2005, 6(3): 9-11.
[2] Watro R, Kong D, Cuti S, et al. TinyPK: Securing Sensor Networks with Public Key Technology[C]//Proc. of the 2nd ACM Workshop on Security of Ad-hoc Networks and Sensor
Networks. Washington D. C., USA: ACM Press, 2004: 59-64.
[3] Benenson Z, Gedicke N, Raivio O. Realizing Robust User Authentication in Sensor Networks[C]//Proc. of REALWSN’05. Stockholm, Sweden: [s. n.], 2005: 20-21.
[4] Wong K H M, Zheng Yuan, Cao Jiannong, et al. A Dynamic User Authentication Scheme for Wireless Sensor Networks[C]// Proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Taichung, China: [s. n.], 2006: 5-7.
[5] Das M L. Two-factor User Authentication in Wireless Sensor Networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(3): 1086-1090.
[6] Chen T H, Shih W K. A Robust Mutual Authentication Protocol for Wireless Sensor Networks[J]. ETRI Journal, 2010, 32(5): 704-712.
[7] Das A K, Sharma P, Chatterjee S, et al. A Dynamic Password- based User Authentication Scheme for Hierarchical Wireless Sensor Networks[J]. Journal of Network and Computer Applications, 2012, 35(5): 1646-1656.
[8] Ferraiolo D, Kuhn R. Role-based Access Control[C]//Proc. of the 15th National Computer Security Conference. Baltimore, USA: [s. n.], 1992: 554-563.
[9] Sandhu R, Coyne E, Feinstein H, et al. Role-based Access Control Models[J]. IEEE Computer, 1996, 29(2): 38-47.
[10] 宋善德, 刘 伟. 基于任务-角色的访问控制模型[J]. 计算机工程与科学, 2005, 27(6): 4-9.
[11] 吴洁明, 王吉栋. 基于角色的访问控制在Struts2中的应 用[J]. 计算机安全, 2012, (2): 23-25.
[12] Huang H F, Chang Y F, Liu C H. Enhancement of Two-factor User Authentication in Wireless Sensor Networks[C]//Proc. of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Darmstadt, Germany: [s. n.], 2010: 27-30.
编辑 金胡考 |