1. Ffoulkes P (2017). The Intelligent Use of Big Data on an Industrial Scale[M]. inside Bigdata. https://insidebigdata.com/white-paper/guide-big-data-industrial-scale/; Hewlett Packard Enterprise. Ffoulkes P (2017). The Intelligent Use of Big Data on an Industrial Scale[M]. inside Bigdata. https://insidebigdata.com/white-paper/guide-big-data-industrial-scale/; Hewlett Packard Enterprise.
2. The Comparative Analysis of Main Access Control Technologies
3. Access control: principle and practice
4. Samarati P and Vimercati S D C D F (2000). Access Control: Policies Models and Mechanisms. Proceedings of the Revised Versions of Lectures Given During the Ifip Wg 17 International School on Foundations of Security Analysis & Design on Foundations of Security Analysis & Design: Tutorial Lectures. Samarati P and Vimercati S D C D F (2000). Access Control: Policies Models and Mechanisms. Proceedings of the Revised Versions of Lectures Given During the Ifip Wg 17 International School on Foundations of Security Analysis & Design on Foundations of Security Analysis & Design: Tutorial Lectures.
5. Association N C S (1987). A Guide to Understanding Discretionary Access Control in Trusted Systems[J]. 1--31. Association N C S (1987). A Guide to Understanding Discretionary Access Control in Trusted Systems[J]. 1--31.