共 15 条
- [1] Ribeiro C., Zuquete A., Ferreira P., Et al., SPL: an access control language for security policies and complex constraints, The Network and Distributed System Security Symposium(NDSS'01), pp. 89-107, (2001)
- [2] Damianou N., Dulay N., Lupu E., Et al., The ponder policy specification language, The International Workshop on Policies for Distributed Systems and Networks, pp. 18-38, (2001)
- [3] eXtensible access control Markup language XACML version 3.0, (2013)
- [4] Rao P., Lin D., Bertino E., Et al., An algebra for fine-grained integration of XACML policies, The 14th ACM Symposium on Access Control Models and Technologies (SACMAT'09), pp. 63-72, (2009)
- [5] Shahzad M., Towards composing access control policies, IEEE International Conference on Communications (ICC), pp. 1-6, (2018)
- [6] Xu Z., Stoller S., Mining attribute-based access control policies, IEEE Transactions on Dependable and Secure Computing, 12, 5, pp. 533-545, (2015)
- [7] Ngo C., Demchenko Y., Laat De C., Decision diagrams for XACML policy evaluation and management, Computers & Security, 49, pp. 1-16, (2015)
- [8] Yao J., Mao B., Xie L., A DAG-based security policy conflicts detection method, Journal of Computer Research and Development, 42, 7, pp. 1108-1114, (2005)
- [9] Li R.X., Lu J.F., Li T.Y., Et al., An approach for resolving inconsistency conflicts in access control policies, Chinese Journal of Computers, 36, 6, pp. 1210-1223, (2013)
- [10] Beckerle M., Martucci L.A., Formal definitions for usable access control rule sets from goals to metrics, The Ninth Symposium on Usable Privacy and Security (SOUPS), pp. 1-11, (2013)