共 10 条
[1]
[Anonymous], 2005, OASIS STANDARD EXTEN
[2]
El Hadj MaryemAit., 2017, SECRYPT, P548
[3]
Hu Hongxin., 2011, Proceedings of the 16th ACM symposium on Access control models and technologies, P165, DOI DOI 10.1145/1998441.1998472
[4]
Liu AX, 2008, PERF E R SI, V36, P265, DOI 10.1145/1384529.1375488
[7]
Proctor S., 2004, SUNS XACML IMPLEMENT
[8]
Ramli C. D. P. K., 2015, ARXIV150302732
[9]
A Verified Algorithm for Detecting Conflicts in XACML Access Control Rules
[J].
PROCEEDINGS OF THE 5TH ACM SIGPLAN CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS (CPP'16),
2016,
:166-175
[10]
Yuan E, 2005, 2005 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, PROCEEDINGS, P561