共 50 条
- [12] Explanations and Relaxations for Policy Conflicts in Physical Access Control 2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, : 330 - 336
- [13] A Dynamic Access Control Policy Based on Hierarchical Description 2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 76 - 80
- [14] Dependent Type Theory for Verification of Information Flow and Access Control Policies ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2013, 35 (02):
- [15] Access Control and Query Verification for Untrusted Databases DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 211 - 225
- [19] Research on Multi-policy Supporting Access Control Model PROCEEDINGS OF THE 2011 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2011, : 185 - 195
- [20] A Tool for Access Control Policy Validation JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01): : 157 - 166