共 24 条
[1]
Benantar M., 2005, Access control systems: security, identity management and trust models, DOI [10.1007/0-387-27716-1, DOI 10.1007/0-387-27716-1]
[2]
Chen H., 2020, Comput. Mater. Continua, V65
[5]
Debellis M., 2021, A Practical Guide to Building OWL Ontologies Using Protege 5.5 and Plugins
[6]
Ferrer Nicolas G., 2021, Implementation of XACML tools
[7]
Hathaliya J, 2019, INT CONF ADV COMPU, P87, DOI [10.1109/IACC48062.2019.8971593, 10.1109/iacc48062.2019.8971593]
[8]
Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems
[J].
PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19),
2019,
:135-140
[9]
Javaid M., 2021, Sensors International, V2, P100122, DOI DOI 10.1016/J.SINTL.2021.100122