共 50 条
[31]
Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents
[J].
WEB INFORMATION SYSTEMS AND TECHNOLOGIES, WEBIST 2013,
2014, 189
:21-36
[32]
Policy Evaluation and Dynamic Management Based on Matching Tree for XACML
[J].
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020),
2020,
:1530-1535
[33]
Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control
[J].
2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC),
2019,
:1964-1970
[36]
Distributed Access Control with Blockchain
[J].
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC),
2019,
[37]
Distributed Trust Based Access Control Architecture for Pervasive Computing
[J].
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009),
2009,
:464-469
[38]
Blockchain Based Auditable Access Control for Distributed Business Processes
[J].
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2020,
:12-22
[39]
Behavioral and Human-Centric Access Control Model in XACML Reference Architecture: Design and Implementation of EHR Case Study
[J].
TECHNOLOGICAL INNOVATION FOR HUMAN-CENTRIC SYSTEMS, DOCEIS 2024,
2024, 716
:192-203
[40]
Distributed Access Control: A Privacy-conscious Approach
[J].
SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES,
2007,
:61-70