Citation: | Li Zhong, Wang Gang, and Liu Jing. A Statistical Admission Control Algorithm for Storage Systems with Mixed Multimedia Workloads[J]. Journal of Computer Research and Development, 2006, 43(3): 563-570. |
[1] | Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun. Survey on Internet of Things Access Control Security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510 |
[2] | Su Mang, Li Fenghua, Shi Guozhen. Action-Based Multi-level Access Control Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1604-1613. |
[3] | Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping. TRBAC: Trust Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420. |
[4] | Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang. An Environment-Adaptive Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(6): 983-990. |
[5] | Li Xiaofeng, Feng Dengguo, and Xu Zhen. A Generic Access Control Administration Model[J]. Journal of Computer Research and Development, 2007, 44(6): 947-957. |
[6] | Jiang Ying, Meng Dan. Enforcing Admission Control Using Admission-Time-Ratio and PI Controller[J]. Journal of Computer Research and Development, 2007, 44(1): 65-70. |
[7] | Xu Zhen, Li Lan, Feng Dengguo. An Access Control Model for DBMS Based on Dynamic Context Stack[J]. Journal of Computer Research and Development, 2005, 42(12): 2093-2099. |
[8] | Xu Wei, Wei Jun, Li Jing. A Service-Oriented Workflow Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(8): 1369-1375. |
[9] | Long Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(5): 868-876. |
[10] | Li Zhendong and Xie Li. Research on Ensuring QoS and Its Admission Control in Web Servers[J]. Journal of Computer Research and Development, 2005, 42(4): 662-668. |