共 50 条
- [21] Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 239 - 262
- [22] Towards a Security Framework for Artifact-centric Workflows Leveraging Runtime Enforcement JOURNAL OF OBJECT TECHNOLOGY, 2024, 23 (02):
- [23] Authorization Constraint Enforcement for Information System Security 2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 3501 - 3506