Author:
Wang Hua,Cao Jinli,Zhang Yanchun
Publisher
Springer International Publishing
Reference61 articles.
1. Barkley, J.F., Beznosov, K., Uppal, J.: Supporting relationships in access control using role based access control. In: Third ACM Workshop on Role Based Access Control, pp. 55–65 (1999)
2. Bellare, M., Goldreich, O., Krawczyk, H.: Stateless evaluation of pseudorandom functions: security beyond the birthday barrier. In: Advances in Cryptology—Crypto 99. Lectures Notes in Computer Science, vol. 1666. Springer, Berlin (1999)
3. Canetti, R., Goldreich, O., Halevi, S.: The random Oracle methodology. In: Proceedings of the 30th ACM STOC ’98, pp. 209–218. IEEE, New York (1998)
4. Cao, J. et al.: Towards secure XML document with usage control. In: Web Technologies Research and Development—APWeb 2005, pp. 296–307. Springer, Berlin (2005)
5. Chan, A., Frankel, Y., Tsiounis, Y.: An Efficient Off-line Electronic Cash Scheme as Secure as RSA, Research report NU-CCS-96-03. Northeastern University, Boston (1995)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献