References
- Ausanka-Cures, R., "Methods for Access Control : Advances and Limitations," http:// www.cs.hmc.edu/~mike/public_html/ courses/security/s06/projects/ryan.pdf
- Baek, S. I., Shin, J. Y., Kim, J. W., "Exploring the Korean Government Policies for Cloud Computing Service," The Journal of Society for e-Business Studies, Vol. 18, No. 3, pp. 1-15, 2013. https://doi.org/10.7838/jsebs.2013.18.3.001
- Bertram, S., Boniface, M. Surridge, M., Briscombe, N., Hall-May, M., "On-Demand Dynamic Security for Risk-Based secure Collaboration in Clouds," In the proceedings of Could Computing, 2010 IEEE 3rd International Conference, 2010.
- Cera, C. D., Kim, T., Han, J. H., Regli, W. C., "Role-based viewing envelopes for information protection in collaborative modeling," Computer-Aided Design Vol. 36, pp. 873-996, 2004. https://doi.org/10.1016/j.cad.2003.09.014
- Chadwick, D. W., Otenko, O. A., "The PE RMIS X. 509 role based privilege management infrastructure," Future Gener. Compt. Syst. Vol. 19, No. 2, pp. 277-248, 2003. https://doi.org/10.1016/S0167-739X(02)00153-X
- Chen, T. Y., Chen, Y. M., Chu, H. C. "Developing a trust evaluation method between co-workders in virtual project team for enabling resource sharing and collaboration," Computers in Industry, Vol. 59, No. 6, pp. 565-579, 2008. https://doi.org/10.1016/j.compind.2008.01.001
- Folk, M., Heber, G., Koziol, Q., Pourmal, E., Robinson, D., "An overview of the HDF5 technology suite and its applications," Proceedings of the EDBT/ICDT 2011 Workshop on Array Databases, pp. 36-47, 2011.
- Halcrow, M. A., "eCryptfs : An Enterprise- class Cryptographic Filesystem for Linux," http://ecryptfs.sourceforge.net/ ecryptfs.pdf.
- Hauck, S., Knol, S., "Data security for Web-based CAD," Proceedings of the 35th annual Design Automation Conference, pp. 788-793, 1998.
- Kim, D. H., Lee, J. H., Park, Y., P., "A Study of Factors Affecting the Adoption of Cloud Computing," The Journal of Society for e-Business Studies, Vol. 17, No. 1, pp. 111-136, February 2012. https://doi.org/10.7838/jsebs.2012.17.1.111
- Kuhn, D. R., Coyne, E. J., Weil, T. R., "Adding Attributes to Role-Based Access Control," Computer Vol. 43, No. 6, pp. 79-81, June 2010.
- LK Soft Ware GmbH, www.lksoft.com
- SCRA, STEP Application Handbook ISO 10303, North Charleston, SC, 30 2006, available at http://www.uspro.org/documents/ STEP_application_hdbk_63006_ BF.pdf.
- STEP Tools, Inc., http://www.steptools. com/demos/.
- Wang, G., Liu, Q., Wu, M., Guo, M., "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Compters and Security Vol. 30, pp. 320-331, 2011. https://doi.org/10.1016/j.cose.2011.05.006
- Wang, Y., Ajoku, P. N., Brustoloni, J. C., Nnaji, B. O., "Intellectual Property Protection in Collaborative Design through Learn Information Modeling and Sharing," Journal of Computing and Information Science in Engineering, Vol. 6, pp. 149-159, 2006. https://doi.org/10.1115/1.2190235
- Wong, A., Bishop, W., "intelligent multilevel regions-of-interest(ROI) document image encryption using an online learning model," proceedings of the Fourth conference on IASTED International conference, 2007.
- Yuan, Chun., Zhu, Bin. B., Su, Ming., Wang, Xiaoming., Li, Shipeng., Zhong, Yuzhuo. "Layered Access Control for MPEG-4FGS Video," Proceedings of Image Processing, 2003.
- Zeng, Y., Wang, L., Deng, X., Cao, X., Khundker, N., "Secure collaboration in global design and supply chain environment : Problem analysis and literature review," Computers in Industry, Vol. 63, No. 6, Auguset pp. 545-556, 2012. https://doi.org/10.1016/j.compind.2012.05.001
- http://www.nsa.gov/ia/_files/support/ Cloud_Computing_Guidance.pdf.