共 25 条
[11]
Frank M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P101
[12]
Graham G. S., 1972, AFIPS Conference Proceedings Vol. 40, the 1972 Spring Joint Computer Conference, P417
[13]
Hejiao Huang, 2012, Proceedings of the 2012 IEEE 36th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW), P427, DOI 10.1109/COMPSACW.2012.81
[14]
Hu VC., 2013, NIST SPECIAL PUBLICA, V800, P1, DOI DOI 10.6028/NIST.SP.800-162
[15]
Enforcing Separation of Duty in Attribute Based Access Control Systems
[J].
INFORMATION SYSTEMS SECURITY, (ICISS 2015),
2015, 9478
:61-78
[16]
Lu H., 2015, J COMPUTER SECURITY, V23, P1
[17]
Evolutionary Inference of Attribute-Based Access Control Policies
[J].
EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I,
2015, 9018
:351-365
[19]
Mocanu DC, 2015, PROC 18 INT MULTICON, P124
[20]
Molloy I, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P21