刘锦德.对于开放系统内涵的澄清[J].计算机应用,1997,17(6):1-2.LIU Jin-de.Open system connotation[J].ComputerApplications,1997,17(6):1-2.(in Chinese)
[2]
张云勇,刘锦德.新一代开放系统及互操作性研究[J].系统工程与电子技术,2002,24(8):94-97.ZHANG Yun-yong,LIU Jin-de.Study on next generationopen system and its interoperability[J].SystemsEngineering and Electronics,2002,24(8):94-97.(inChinese)
[3]
孙玉方.开放系统的国际标准化[J].计算机工程与应用,1994(5):27-31.SUN Yu-fang.Open system of the international standard[J].Computer Engineering and Applications,1994(5):27-31.(in Chinese)
[4]
王怀民.开放系统的概念[J].计算机工程与科学,1995(3):105-113.WANG Huai-min.The concept of open systems[J].Computer Engineering&Science,1995(3):105-113.(in Chinese)
[5]
胡贯荣,刘键.开放系统技术的探讨[J].计算机工程与设计,1995,16(3):37-40.HU Guan-rong,LIU Jian.Research on open system[J].Comouter Engineering and Design,1995,16(3):37-40.(in Chinese)
[6]
REN Shang-ping,YU Yue,CHEN Nian-en,et al.Actotrs,roles and coordinators:a coordination model foropen distributed and embedded systems[C]∥8thInternational Conference on Coordination Models andLanguages,Bologna,June 14-16,2006:247-265.
[7]
张继军.通信服务质量术语与通用QOS模型[J].光通信研究,2004,3:33-35.ZHANG Ji-jun.Quality of service terminology incommunication network and the general QOS model[J].Study on Optical Communications,2004,3:33-35.(inChinese)
LEE S C,HEINBUCH D V.Training a neural-networkbased intrusion detector to recognize novel attacks[J].IEEE Transactions on Systems,Man and Cybernetics:Part A,2001,31(4):294-299.
[11]
SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].Computer,1996,29(2):38-47.
[12]
张可翔,谢冬青,冷健.一种基于属性证书和角色的访问控制模型[J].微电子学与计算机,2006,23(11):143-148.ZHANG Ke-xiang,XIE Dong-qing,LENG Jian.Therole-based access coontrol via attribute certificate[J].Microelectronics&Computer,2006,23(11):143-148.(in Chinese)
[13]
吴江栋,李伟华,安喜锋.基于RBAC的细粒度访问控制方法[J].计算机工程,2008,34(20):52-54.WU Jiang-dong,LI Wei-hua,AN Xi-feng.Method offinely granular access control based on RBAC[J].Comouter Engineering,2008,34(20):52-54.(inChinese)
杨亚平,李伟琴,刘怀宇.基于角色的细粒度访问控制系统的研究与实现[J].北京航空航天大学学报,2001,27(2):178-181.YANG Ya-ping,LI Wei-qin,LIU Huai-yu.Research andimplementation of role based access control system[J].Journal of Beijing University of Aeronautics andAstronautics,2001,27(2):178-181.(in Chinese)
[16]
KWIAT K,REN Shang-ping.A coordination model forimproving software system attack-tolerance andsurvivability in open hostile environments[C]∥IEEEInternational Conference on Sensor Network,Ubiquitous,and Trustworthy Computing,Taiwan,June 5-7,2006:1-9.