1. Waston P. A multi-level security model for partitioning workflows over federated clouds [J]. Journal of Cloud Computing, 2012, 1(1): 1–15.
2. Waston P, Mark L. Multi-level security for deploying distributed applications on clouds, devices and things[C]//2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). New Jersey: IEEE Press, 2014: 380–385.
3. Sellami M, Gammoudi M M, Hacid M S. Secure data integration: A formal concept analysis based approach [J]. Database and Expert Systems Applications, 2014, 8645: 326–333.
4. Haddad M, Hacid M S, Laurini R. Data integration in presence of authorization policies [C]//IEEE 11th Inte-r national Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). New Jersey: IEEE Press, 2012: 92–99.
5. Pan L, Xu Q. Visualization analysis of multidomain access control policy integration based on treemaps and semantic substrates [J]. Intelligent Information Management, 2012, 4(5): 188–193.