Author:
Rashid Aqsa,Masood Asif,Abbas Haider
Publisher
Springer International Publishing
Reference22 articles.
1. McKinney, S.: CON 2324. A practical guide to role. Engineering. JavaOne, San Francisco (2015)
2. Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)
3. Farrell, S., Housley, R.: An Internet attribute certificate profile for authorization. In: RFC 3281 (2002)
4. Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38–43 (1999)
5. Yaga, D., et al.: Blockchain technology overview. No. NIST Internal or Interagency Report (NISTIR) 8202 (Draft). National Institute of Standards and Technology (2018)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献