Have a personal or library account? Click to login
A CEP Privacy Security Access Control Framework Based on Event Attribute Detecting Tree Cover

A CEP Privacy Security Access Control Framework Based on Event Attribute Detecting Tree

By: Bo Hong and  Xin Jing  
Open Access
|Oct 2019

References

  1. Luckham D. The power of events: An introduction to complex event processing in distributed enterprise systems[M]. Springer, 2008.
  2. Buddhika T, Ray I, Linderman M, Jayasumana A. Secure complex event processing in a heterogeneous and dynamic network[C]. SPIE Defense+ Security, International Society for Optics and Photonics,2014:907907-907913.
  3. Carminati B, Ferrari E, Tan K L. Enforcing access control over data streams[C]. Proceedings of the 12th ACM symposium on Access control models and technologies, ACM,2007:21-30.
  4. Carminati B, Ferrari E, Cao J, Tan K L. A framework to enforce access control over data streams[J]. ACM Transactions on Information and System Security (TISSEC), 2010,13(3):28.
  5. Tang Jin-peng, Li Ling-lin, Yang Lu-ming. User attributes oriented RBAC model[J]. Computer Engineering and Design, 2010,(10):2184-2186.
  6. Xiong Hou-ren, Chen Xing-yuan, Zhang Bin, Yang Yan. Security Principles for RBAC-based Authorization Management[J]. Computer Science, 2015, 42(3): 117-123.
  7. Jing Xin, Zhang Jing. Research on Parallel CEP Processing with the Multi-Event Pattern Shareing Capability[J]. Journal of Xi' an Technological University, 2014,34(9):715-719.
Language: English
Page range: 77 - 84
Published on: Oct 1, 2019
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Bo Hong, Xin Jing, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.