共 50 条
- [1] Evaluating access control policies through model checking INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 446 - 460
- [2] TOWARDS FORMAL SECURITY ANALYSIS OF DECENTRALIZED INFORMATION FLOW CONTROL POLICIES INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 7969 - 7981
- [3] CorbFuzz: Checking Browser Security Policies with Fuzzing 2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 215 - 226
- [5] Security Analysis of Access Control Policies for Smart Homes PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 99 - 106
- [6] A Unified Class Model for Checking Security Policies in ICT Infrastructures 2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL), 2012,
- [7] Conformance Checking of Dynamic Access Control Policies FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 227 - 242
- [8] Model-checking access control policies INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 219 - 230
- [9] Work-in-Progress: Combining Control Flow Checking for Safety and Security in Embedded Software 2017 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE (EMSOFT), 2017,
- [10] Control Flow Checking Optimization Based On Regular Patterns Analysis 2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 203 - 212