Author:
Khan Saad,Parkinson Simon
Publisher
Springer International Publishing
Reference46 articles.
1. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE Infocom. Ieee, pp 1–9
2. Burgess M (2003) On the theory of system administration. Sci Comput Program 49(1):1–46
3. Wang H, Guo X, Fan Y, Bi J (2014) Extended access control and recommendation methods for enterprise knowledge management system. IERI Procedia 10:224–230
4. Stiawan D, Idris M, Abdullah AH et al (2015) Penetration testing and network auditing: Linux. J Inf Process Syst 11(1)
5. Ghallab M, Nau DS, Traverso P (2004) Automated planning: theory and practice. Elsevier/Morgan Kaufmann, London, Amsterdam