共 50 条
- [1] Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies 2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 198 - 202
- [5] iOracle: Automated Evaluation of Access Control Policies in iOS PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 117 - 131
- [6] A Formal Approach for the Verification of AWS IAM Access Control Policies SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2017), 2017, 10465 : 59 - 74
- [7] Verification of Information Flow and Access Control Policies with Dependent Types 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 165 - 179
- [9] Dependent Type Theory for Verification of Information Flow and Access Control Policies ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2013, 35 (02):