共 50 条
- [3] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [4] Attribute Expressions, Policy Tables and Attribute-Based Access Control [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
- [5] On the Feasibility of Attribute-Based Access Control Policy Mining [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
- [6] Attribute-based lightweight reconfigurable access control policy [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
- [10] Attribute-Based Access Control Policy Review in Permissioned Blockchain [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109