共 23 条
[1]
[Anonymous], **DROPPED REF**
[2]
[Anonymous], 2002, Introduction to Constraint Databases
[3]
[Anonymous], P 1 ACM WORKSH ROL B
[4]
[Anonymous], ACM T INFORM SYST, DOI DOI 10.1145/605434.605435
[5]
BAKER N, 1993, AUSTR COMPUTER SCI C, P321
[6]
Barker S., 2003, ACM Transactions on Information and Systems Security, V6, P501, DOI 10.1145/950191.950194
[7]
BECKER MY, 2004, IN PRESS P 17 IEEE C
[8]
Blaze M, 1999, LECT NOTES COMPUT SC, V1550, P59
[9]
Decentralized trust management
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:164-173
[10]
CLARKE D, 2001, J COMPUTER SECURITY, V9, P2852