共 22 条
[1]
[Anonymous], 2011, P 1 ACM C DAT APPL S
[2]
[Anonymous], 2017, Funkwhale
[3]
[Anonymous], 2004, elgg
[4]
[Anonymous], 2019, mitmproxy
[5]
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies
[J].
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES,
2020,
:167-178
[7]
Mining ABAC Rules from Sparse Logs
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:31-46
[8]
Path Conditions and Principal Matching: A New Approach to Access Control
[J].
PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14),
2014,
:187-198
[10]
Black Widow: Blackbox Data-driven Web Scanning
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:1125-1142