-
1
-
-
0027710821
-
High assurance discretionary access control for object bases
-
3-5 November, ACM, NY, USA
-
Bertino, E., Samarati, P. and Jajodia, S. (1993) 'High assurance discretionary access control for object bases', Proceedings of the 1st ACM Conference on Computer and Communications Security, 3-5 November, ACM, NY, USA.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
2
-
-
77949906705
-
Cloud manufacturing - A new service-oriented networked manufacturing model
-
Bohu, L., Lin, Z., Shilong, W., et al. (2010) 'Cloud manufacturing - a new service-oriented networked manufacturing model', Computer Integrated Manufacturing Systems, Vol. 16, No. 1, pp.1-7.
-
(2010)
Computer Integrated Manufacturing Systems
, vol.16
, Issue.1
, pp. 1-7
-
-
Bohu, L.1
Lin, Z.2
Shilong, W.3
-
3
-
-
70349400264
-
Networked modeling & simulation platform based on concept of cloud computing - Cloud simulation platform
-
Bohu, L., Xudong, C., Baocun, H., et al. (2009) 'Networked modeling & simulation platform based on concept of cloud computing - cloud simulation platform', Journal of System Simulation, Vol. 21, No. 17, pp.5292-5299.
-
(2009)
Journal of System Simulation
, vol.21
, Issue.17
, pp. 5292-5299
-
-
Bohu, L.1
Xudong, C.2
Baocun, H.3
-
4
-
-
77955515023
-
Special section: Federated resource management in grid and cloud computing systems
-
Buyya, R. and Ranjan, R. (2010) 'Special section: federated resource management in grid and cloud computing systems', Future Generation Computer Systems, Vol. 26, No. 8, pp.1189-1191.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.8
, pp. 1189-1191
-
-
Buyya, R.1
Ranjan, R.2
-
5
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya, R., Yeo, C.S., Venugopal, S., et al. (2009) 'Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility', Future Generation Computer Systems, Vol. 25, No. 6, pp.599-616.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
6
-
-
34047142338
-
Access control for collaborative environment in networked manufacturing system
-
Ce, L., Tianyua, X. and Linxuan, Z. (2007) 'Access control for collaborative environment in networked manufacturing system', Computer Integrated Manufacturing Systems, Vol. 13, No. 1, pp.136-140.
-
(2007)
Computer Integrated Manufacturing Systems
, vol.13
, Issue.1
, pp. 136-140
-
-
Ce, L.1
Tianyua, X.2
Linxuan, Z.3
-
7
-
-
77958132877
-
The good, the bad and the ugly of consumer cloud storage
-
Hu, W., Yang, T. and Matthews, J.N. (2010) 'The good, the bad and the ugly of consumer cloud storage', Operating Systems Review, Vol. 44, No. 3, pp.110-115.
-
(2010)
Operating Systems Review
, vol.44
, Issue.3
, pp. 110-115
-
-
Hu, W.1
Yang, T.2
Matthews, J.N.3
-
8
-
-
17444406680
-
Generalized temporal role-based access control model
-
James, J.B., Elisa, B. and Usman, L.A. (2005) 'Generalized temporal role-based access control model', IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 1, pp.4-23.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
James, J.B.1
Elisa, B.2
Usman, L.A.3
-
9
-
-
0038642644
-
Task-based access control mode
-
Jibo, D. and Fan, H. (2003) 'Task-based access control mode', Journal of Software, Vol. 14, No. 1, pp.76-82.
-
(2003)
Journal of Software
, vol.14
, Issue.1
, pp. 76-82
-
-
Jibo, D.1
Fan, H.2
-
10
-
-
77955131289
-
Can public-cloud security meet its unique challenges?
-
Kaufman, L.M. (2010) 'Can public-cloud security meet its unique challenges?', EEE Security and Privacy, Vol. 8, No. 4, pp.55-57.
-
(2010)
EEE Security and Privacy
, vol.8
, Issue.4
, pp. 55-57
-
-
Kaufman, L.M.1
-
11
-
-
0038825675
-
Task-role-based access control model
-
Oh, S. and Park, S. (2003) 'Task-role-based access control model', Information Systems, Vol. 28, No. 6, pp.533-562.
-
(2003)
Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
12
-
-
0033652039
-
NIST model for role-based access control: Towards a unified standard
-
26-27 July, ACM, Berlin
-
Sandhu, R., Ferraiolo, D. and Kuhn, R. (2000) 'NIST model for role-based access control: towards a unified standard', Proceedings of the ACM Workshop on Role-Based Access Control, 26-27 July, ACM, Berlin.
-
(2000)
Proceedings of the ACM Workshop on Role-Based Access Control
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
13
-
-
0001549660
-
ARBAC97 model for role-based administration of role
-
Sandhu, S.R., Bhamidipati, V. and Munawer, Q. (1999) 'ARBAC97 model for role-based administration of role', ACM Transactions on Information and System Security, Vol. 2, No. 1, pp.105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, S.R.1
Bhamidipati, V.2
Munawer, Q.3
-
14
-
-
79960132307
-
Group technology in cloud manufacturing
-
Xinjian, G., Jixi, C., Yangjian, J., et al. (2010) 'Group technology in cloud manufacturing', Group Technology & Production Modernization, Vol. 27, No. 3, pp.1-4.
-
(2010)
Group Technology & Production Modernization
, vol.27
, Issue.3
, pp. 1-4
-
-
Xinjian, G.1
Jixi, C.2
Yangjian, J.3
|