共 50 条
- [21] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
- [23] Secure access privilege delegation using attribute-based encryption International Journal of Information Security, 2023, 22 : 1261 - 1276
- [24] Mining Attribute-Based Access Control Policies from Logs DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [25] Specification and Analysis of Attribute-Based Access Control Policies: An Overview 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
- [26] Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls BIG DATA TECHNOLOGIES AND APPLICATIONS, EAI INTERNATIONAL CONFERENCE, BDTA 2023, 2024, 555 : 79 - 94
- [28] VisMAP: Visual Mining of Attribute-Based Access Control Policies INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
- [29] Polisma - A Framework for Learning Attribute-Based Access Control Policies COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
- [30] Attribute-based encryption with Hidden access structures Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (02): : 457 - 461