共 39 条
[1]
Web Services Policy Generation Based on SLA Requirements
[J].
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC),
2017,
:146-154
[2]
A Deep Learning Approach for Extracting Attributes of ABAC Policies
[J].
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES,
2018,
:137-148
[3]
[Anonymous], 2023, Tsung
[5]
IoTGUARD: Dynamic Enforcement of Security and Safety Policy in Commodity IoT
[J].
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019),
2019,
[6]
Celik ZB, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P147
[7]
Towards Continuous Access Control Validation and Forensics
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:113-129
[10]
Gao S, 2019, CHINA COMMUN, V16, P111, DOI 10.23919/JCC.2019.12.008