1. Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs
2. Enterprise data breach: causes, challenges, prevention, and future directions;Cheng Long;Wiley Interdiscip. Rev.: Data Min. Knowl. Discovery.,2017
3. Karabulut Yuecel , Kerschbaum Florian , Massacci Fabio , Robinson Philip and Yautsiukhin A . 2007 . Security and trust in IT business outsourcing: a manifesto. Electron. Notes Theor. Comput. Sci . 179, 6(July 2007), 47-58. https://doi.org/10.1016/j.entcs.2006.08.030 10.1016/j.entcs.2006.08.030 Karabulut Yuecel, Kerschbaum Florian, Massacci Fabio, Robinson Philip and Yautsiukhin A. 2007. Security and trust in IT business outsourcing: a manifesto. Electron. Notes Theor. Comput. Sci. 179, 6(July 2007), 47-58. https://doi.org/10.1016/j.entcs.2006.08.030
4. Sabrina De Capitani di Vimercati , Stefano Paraboschi and Pierangela Samarati . 2003 . Access control: principles and solutions. Softw. Pract. Exper , 33, 5(April 2003), 397-421. https://doi.org/10.1002/spe.513 10.1002/spe.513 Sabrina De Capitani di Vimercati, Stefano Paraboschi and Pierangela Samarati. 2003. Access control: principles and solutions. Softw. Pract. Exper, 33, 5(April 2003), 397-421. https://doi.org/10.1002/spe.513
5. Usage control in computer security: A survey