共 50 条
- [31] Adventures in the Analysis of Access Control Policies FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 467 - 482
- [32] An Access and Information Flow Control Paradigm for Secure Information Sharing in Service-Based Systems 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 1, 2015, : 60 - 67
- [33] Access Control and Query Verification for Untrusted Databases DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 211 - 225
- [34] General Methods for Access Control Policy Verification PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 315 - 323
- [37] Oblivious Transfer with Hidden Access Control Policies PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +
- [38] Data Sharing in Presence of Access Control Policies ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 301 - 309
- [39] Detecting Inconsistency and Incompleteness in Access Control Policies CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 731 - 739