共 50 条
- [41] POSTER: Analyzing Access Control Policies with SMT CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1508 - 1510
- [43] Towards Automatic Repair of Access Control Policies 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
- [44] Governance policies for privacy access control and their interactions FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VIII, 2005, : 114 - 130
- [45] Many-to-Many Information Flow Policies COORDINATION MODELS AND LANGUAGES, COORDINATION 2017, 2017, 10319 : 159 - 177
- [47] A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (05): : 1149 - 1159
- [48] A Framework for the Cryptographic Enforcement of Information Flow Policies PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 143 - 154
- [50] Enabling Verification and Conformance Testing for Access Control Model SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 195 - 204