Author:
Shan Dibin,Du Xuehui,Wang Wenjuan,Wang Na,Liu Aodi
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference48 articles.
1. Research on Access Control of Big Data;Li;Chinese Journal of Computers,2017
2. Park, J., D. Nguyen, R. Sandhu. A provenance-based access control model. in Tenth Annual International Conference on Privacy, Security and Trust (PST). 2012. Paris, France: IEEE. p. 137-144. DOI: 10.1109/pst.2012.6297930.
3. Nguyen, D., J. Park, R. Sandhu. A provenance-based access control model for dynamic separation of duties. in Eleventh Annual Conference on Privacy, Security and Trust (PST). 2013. Tarragona, Spain: IEEE. p. 247-256. DOI: 10.1109/pst.2013.6596060.
4. Pei, J., X. Ye. Towards Policy Retrieval for Provenance Based Access Control Model. in IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 2014. Beijing, China: IEEE. p. 769-776. DOI: 10.1109/trustcom.2014.101.
5. A fine-grained policy model for Provenance-based Access Control and Policy Algebras;Fan;ArXiv:2001.01945v1,2020