共 50 条
- [21] Quality Analysis for Scientific Workflow Provenance Access Control Policies 2018 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2018), 2018, : 261 - 264
- [24] Oblivious access control policies for cloud based data sharing systems Computing, 2012, 94 : 915 - 938
- [26] Verification of Cloud Security Policies 2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
- [28] Detection of Multiple-Duty-Related Security Leakage in Access Control Policies 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 65 - 74
- [29] Representing Flexible Role-Based Access Control Policies Using Objects and Defeasible Reasoning RULE TECHNOLOGIES: FOUNDATIONS, TOOLS, AND APPLICATIONS, 2015, 9202 : 376 - 387
- [30] A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 489 - 506