共 52 条
[3]
ALUR R, 1992, LECT NOTES COMPUT SC, V600, P74, DOI 10.1007/BFb0031988
[4]
[Anonymous], 2008, P 28 IARCS C FDN SOF, DOI [DOI 10.4230/LIPICS.FSTTCS.2008.1740, 10.4230/LIPIcs.FSTTCS.2008.1740]
[5]
[Anonymous], 2004, ROLE BASED ACCESS CO
[6]
Barringer H, 2004, LECT NOTES COMPUT SC, V2937, P44
[7]
Basin D., 2011, Proceedings of the 2011 Eighteenth International Symposium on Temporal Representation and Reasoning (TIME 2011), P88, DOI 10.1109/TIME.2011.14
[8]
Basin D, 2012, LECT NOTES COMPUT SC, V7215, P309, DOI 10.1007/978-3-642-28641-4_17
[9]
Monitoring Security Policies with Metric First-order Temporal Logic
[J].
SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES,
2010,
:23-33
[10]
Basin David., 2007, ASIACCS, P70