共 29 条
[1]
Blundo C., 2012, ARXIV E PRINTS
[2]
Colantonio A, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P85, DOI 10.1145/1542207.1542223
[3]
Colantonio A, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P2129
[4]
COYNE EJ, 1996, P 1 ACM WORKSH ROL B, P15, DOI DOI 10.1145/270152.270159
[5]
Ene A, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P1
[6]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[7]
Fleischner H, 2007, LECT NOTES COMPUT SC, V4855, P340
[9]
Frank M, 2012, J MACH LEARN RES, V13, P459
[10]
Frank M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P101