共 50 条
- [32] Oblivious Transfer with Hidden Access Control Policies PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +
- [33] Data Sharing in Presence of Access Control Policies ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 301 - 309
- [34] Detecting Inconsistency and Incompleteness in Access Control Policies CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 731 - 739
- [36] POSTER: Analyzing Access Control Policies with SMT CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1508 - 1510
- [38] Towards Automatic Repair of Access Control Policies 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
- [39] Governance policies for privacy access control and their interactions FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VIII, 2005, : 114 - 130
- [40] A Study on Automated Context-aware Access Control Model Using Ontology ADVANCED COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2010, 74 : 179 - 186