[1]Ieee B E. IEEE Standard for Authentication in Host Attachments of Transient Storage Devices[S]. Los Alamitos, CA: IEEE Computer Society, 2010
[2]Berghel H. WikiLeaks and the matter of private manning[J]. Computer, 2012, 45(3): 7073
[3]Landau S. Making sense from Snowden: Whats significant in the NSA surveillance revelations[J].IEEE Security & Privacy, 2013, 11(4): 5463
[4]张学思. 基于移动存储设备的多密级安全交互系统设计与实现[D]. 郑州: 解放军信息工程大学, 2015
[5]龚碧, 郁滨. 一种基于用户策略的多区域交互控制模型[J]. 系统仿真学报, 2017, 29(4): 880885
[6]刘志宏, 马建峰, 黄启萍. 基于区域的无线传感器网络密钥管理[J]. 计算机学报, 2006, 29(9): 16081616
[7]李慧贤, 庞辽军, 王育民. 适合ad hoc网络无需安全信道的密钥管理方案[J]. 通信学报, 2010, 31(1): 112117
[8]罗长远, 李伟, 邢洪智, 等. 空间网络中基于身份的分布式密钥管理研究[J]. 电子与信息学报, 2010, 32(1): 183188
[9]李昊鹏, 陈立云, 卢昱, 等. 一种适用于军事物联网的密钥管理方案[J]. 军械工程学院学报, 2017, 29(3): 3033
[10]余哲赋, 周海刚, 吴兆峰, 等. 基于无证书的卫星网络密钥管理方案[J]. 军事通信技术, 2012 (2): 812, 27
[11]张兵, 秦志光, 万国根. 基于PKI和CPK的RFID系统混合密钥管理机制研究[J]. 电子科技大学学报, 2015, 44(3): 415421
[12]Akl S G, Taylor P D. Cryptographic solution to a problem of access control in a hierarchy[J]. ACM Trans on Computer Systems, 1983, 1(3): 239248
[13]Zych A, Petkovi M, Jonker W. Efficient key management for cryptographically enforced access control[J]. Computer Standards & Interfaces, 2008, 30(6): 410417
[14]Zhang J, Li J, Liu X. An efficient key management scheme for access control in a user hierarchy[C] Proc of Int Conf on Information Technology and Computer Science. Piscataway, NJ: IEEE, 2009: 550553
[15]Basu A, Sengupta I. Improved secure dynamic key management scheme with access control in user hierarchy[C] Proc of Int Conf on Digital Information & Communication Technology & ITS Applications. Piscataway, NJ: IEEE, 2012: 220225
[16]Wu S, Chen K. An efficient keymanagement scheme for hierarchical access control in emedicine system[J]. Journal of Medical Systems, 2012, 36(4): 23252337
[17]Sun Xiaohan. A secure scheme of key management for database encryption[C] Advances in Technology and Management. Berlin: Springer, 2012: 315319.
[18]高宝阳, 潘进, 康连瑞. 一种基于等级树模型的群组密钥管理方案[J]. 计算机与现代化, 2014 (8): 3437
[19]胡前伟, 李子臣, 闫玺玺. 等级访问控制下密文数据库密钥管理方案研究[J]. 计算机科学与探索, 2017, 11(6): 921931 |