吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (01): 158-163.doi: 10.13229/j.cnki.jdxbgxb201401027
• paper • Previous Articles Next Articles
YANG Zan1,2, WANG Jian-xin2, YANG Lin2, LIU Xiao-ming1, WEI Zhen-zhen3, CHEN Jie-kun4
CLC Number:
[1] Papazoglou M P, Georgakopoulos D. Serive-oriented computing[J]. Communcications of the ACM, 2003, 46(10): 25-65.[2] Sandhu R S, Samarati P. Access control: principles and practice[J]. Communication Magazine, 1994, 32(9):40-48.[3] Defense Information Systems Agency. A security architecture for NET-CENTRIC enterprise services[Z].Version 0.3, 2004.[4] Sandhu R S, Ferraiolo D, Kuhn R. The NIST model for role-based access control: towards a unified standard[C]//Proceedings of the Fifth ACM Workshop on Role-based Access Control, 2000:47-63.[5] Kapadia A, Al-mohtadi J, Campbell R, et al. IRBAC 2000: secure interoperability using dynamic role translation[R]. Savoy: Technical Report in Illinois University, 2000.[6] Blaze M, Feigenbaum J, Ioannidis J, et al. The role of trust management in distributed system security[C]//Secure Internet Programming, Berlin: Springer Verlag Inc, 2000:185-210.[7] Sabater J, Serria C. Review on computational trust and reputation models[J]. Artificial Intelligence Review, 2005, 24(1): 33-60.[8] 王小明, 付红, 张立臣. 基于属性的访问控制研究进展[J]. 电子学报, 2010, 38(7):1660-1667. Wang Xiao-ming, Fu Hong, Zhang Li-chen. Research progress on attribute-based access control[J]. Acta Electronica Sinica, 2010, 38(7):1660-1667.[9] Park J, Sandhu R. Towards usage control models: beyond traditional access control[C]//SACMAT, California, USA, 2002.[10] Sandhu R, Park J. Usage control: a vision for next generation access control[C]//MMM-ACNS, LNCS 2776, Springer Verlag, Berlin, 2003:17-31.[11] Kuhn D, Coyne E, Weil T. Adding attributes to role-based access control[J]. IEEE Computer, 2010, 43(10):79-81.[12] Tang W, Chen Z. Research of subjective trust management model based on fuzzy set theory[J]. Journal of Software, 2003, 14(8):1401-1408.[13] Ludwig S A, Pulimi V, Hnativ A. Fuzzy approach for the evaluation of trust and reputation of services[C]//IEEE Proceedings of the 18th International Conference on Fuzzy Systems, USA, 2009:115-120.[14] Blaze M, Kannan S, Lee I, et al. Dynamic trust management[J]. IEEE Computer Society, 2009, 42(2):44-52. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|