http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Access Control, Confidentiality and Privacy for Video Surveillance Databases
Thuraisingham, B.; Lavee, G.; Bertino, E.; Fan, J.; Khan, L. ACM Press, 2006 p.1-10
Key Management for Non-Tree Access Hierarchies
Atallah, M. J.; Blanton, M.; Frikken, K. B. ACM Press, 2006 p.11-18
PRIMA: Policy-Reduced Integrity Measurement Architecture
Jaeger, T.; Sailer, R.; Shankar, U. ACM Press, 2006 p.19-28
On Classifying Access Control Implementations for Distributed Systems
Kae, K.; Browne, J. C. ACM Press, 2006 p.29-38
Traust: A Trust Negotiation-Based Authorization Service for Open Systems
Lee, A. J.; Winslett, M.; Basney, J.; Welch, V. ACM Press, 2006 p.39-48
TrustBAC - Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems
Chakraborty, S.; Ray, I. ACM Press, 2006 p.49-58
Integrating Presence Inference into Trust Management for Ubiquitous Systems
Noda, J.; Takahashi, M.; Hosomi, I.; Mouri, H.; Takata, Y.; Seki, H. ACM Press, 2006 p.59-68
Security in Enterprise Resource Planning Systems and Service-Oriented Architectures
Schaad, A. ACM Press, 2006 p.69-70
Trust Management with Delegation in Grouped Peer-to-Peer Communities
Ravichandran, A.; Yoon, J. ACM Press, 2006 p.71-80
Fine-grained Role-based Delegation in Presence of the Hybrid Role Hierarchy
Joshi, J. B. D.; Bertino, E. ACM Press, 2006 p.81-90