1 |
Ausanka-Cures, R., "Methods for Access Control : Advances and Limitations," http:// www.cs.hmc.edu/~mike/public_html/ courses/security/s06/projects/ryan.pdf
|
2 |
Baek, S. I., Shin, J. Y., Kim, J. W., "Exploring the Korean Government Policies for Cloud Computing Service," The Journal of Society for e-Business Studies, Vol. 18, No. 3, pp. 1-15, 2013.
과학기술학회마을
DOI
ScienceOn
|
3 |
Bertram, S., Boniface, M. Surridge, M., Briscombe, N., Hall-May, M., "On-Demand Dynamic Security for Risk-Based secure Collaboration in Clouds," In the proceedings of Could Computing, 2010 IEEE 3rd International Conference, 2010.
|
4 |
Cera, C. D., Kim, T., Han, J. H., Regli, W. C., "Role-based viewing envelopes for information protection in collaborative modeling," Computer-Aided Design Vol. 36, pp. 873-996, 2004.
DOI
ScienceOn
|
5 |
Chadwick, D. W., Otenko, O. A., "The PE RMIS X. 509 role based privilege management infrastructure," Future Gener. Compt. Syst. Vol. 19, No. 2, pp. 277-248, 2003.
DOI
ScienceOn
|
6 |
Chen, T. Y., Chen, Y. M., Chu, H. C. "Developing a trust evaluation method between co-workders in virtual project team for enabling resource sharing and collaboration," Computers in Industry, Vol. 59, No. 6, pp. 565-579, 2008.
DOI
ScienceOn
|
7 |
Folk, M., Heber, G., Koziol, Q., Pourmal, E., Robinson, D., "An overview of the HDF5 technology suite and its applications," Proceedings of the EDBT/ICDT 2011 Workshop on Array Databases, pp. 36-47, 2011.
|
8 |
Halcrow, M. A., "eCryptfs : An Enterprise- class Cryptographic Filesystem for Linux," http://ecryptfs.sourceforge.net/ ecryptfs.pdf.
|
9 |
Hauck, S., Knol, S., "Data security for Web-based CAD," Proceedings of the 35th annual Design Automation Conference, pp. 788-793, 1998.
|
10 |
Kim, D. H., Lee, J. H., Park, Y., P., "A Study of Factors Affecting the Adoption of Cloud Computing," The Journal of Society for e-Business Studies, Vol. 17, No. 1, pp. 111-136, February 2012.
DOI
ScienceOn
|
11 |
Kuhn, D. R., Coyne, E. J., Weil, T. R., "Adding Attributes to Role-Based Access Control," Computer Vol. 43, No. 6, pp. 79-81, June 2010.
|
12 |
LK Soft Ware GmbH, www.lksoft.com
|
13 |
SCRA, STEP Application Handbook ISO 10303, North Charleston, SC, 30 2006, available at http://www.uspro.org/documents/ STEP_application_hdbk_63006_ BF.pdf.
|
14 |
STEP Tools, Inc., http://www.steptools. com/demos/.
|
15 |
Wang, G., Liu, Q., Wu, M., Guo, M., "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Compters and Security Vol. 30, pp. 320-331, 2011.
DOI
ScienceOn
|
16 |
Zeng, Y., Wang, L., Deng, X., Cao, X., Khundker, N., "Secure collaboration in global design and supply chain environment : Problem analysis and literature review," Computers in Industry, Vol. 63, No. 6, Auguset pp. 545-556, 2012.
DOI
ScienceOn
|
17 |
Wang, Y., Ajoku, P. N., Brustoloni, J. C., Nnaji, B. O., "Intellectual Property Protection in Collaborative Design through Learn Information Modeling and Sharing," Journal of Computing and Information Science in Engineering, Vol. 6, pp. 149-159, 2006.
DOI
ScienceOn
|
18 |
Wong, A., Bishop, W., "intelligent multilevel regions-of-interest(ROI) document image encryption using an online learning model," proceedings of the Fourth conference on IASTED International conference, 2007.
|
19 |
Yuan, Chun., Zhu, Bin. B., Su, Ming., Wang, Xiaoming., Li, Shipeng., Zhong, Yuzhuo. "Layered Access Control for MPEG-4FGS Video," Proceedings of Image Processing, 2003.
|
20 |
http://www.nsa.gov/ia/_files/support/ Cloud_Computing_Guidance.pdf.
|