共 50 条
- [31] Classifying and Comparing Attribute-Based and Relationship-Based Access Control PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 59 - 70
- [32] Immediate attribute revocation in decentralized attribute-based access control 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
- [33] Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 18 - 29
- [35] Efficiently Supporting Attribute-Based Access Control in Relational Databases 2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 230 - 239
- [36] Specification and Analysis of Attribute-Based Access Control Policies: An Overview 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
- [37] POSTER: Enabling Attribute-Based Access Control in Linux Kernel ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1237 - 1239
- [38] A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19), 2020, 1156 : 165 - 175
- [39] A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1832 - 1853
- [40] An Ontology-Based Approach to Dynamic Contextual Role for Pervasive Access Control PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 601 - 608