共 50 条
- [21] Using semantic policies for ad-hoc coalition access control 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 308 - +
- [22] A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19), 2020, 1156 : 165 - 175
- [23] A flexible database security system using multiple access control policies PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 236 - 240
- [24] Testing Access Control and Obligation Policies 2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
- [25] Analysis of Computing Policies Using SAT Solvers (Short Paper) STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2016, 2016, 10083 : 190 - 194
- [27] Using Semantics for Automatic Enforcement of Access Control Policies among Dynamic Coalitions SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 235 - 244
- [28] A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages Journal of Medical Systems, 2020, 44
- [29] Access Control and Query Verification for Untrusted Databases DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 211 - 225
- [30] General Methods for Access Control Policy Verification PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 315 - 323