共 35 条
- [11] Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295
- [12] EFFICIENT CHECKING OF TEMPORAL INTEGRITY CONSTRAINTS USING BOUNDED HISTORY ENCODING [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 1995, 20 (02): : 149 - 186
- [13] LOLA:: Runtime monitoring of synchronous systems [J]. 12TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2005, : 166 - 174
- [14] Dinesh N, 2008, LECT NOTES COMPUT SC, V5289, P86
- [15] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
- [16] Giblin C, 2005, FRONT ARTIF INTEL AP, V134, P37
- [17] Hallé S, 2009, LECT NOTES COMPUT SC, V5643, P648, DOI 10.1007/978-3-642-02658-4_50
- [19] Hilty M, 2005, LECT NOTES COMPUT SC, V3679, P98
- [20] A logical language for expressing authorizations [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 31 - 42