共 50 条
- [2] Analysis of XACML Policies with ASP 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
- [3] On the Use of SMT Solving for XACML Policy Evaluation 2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 539 - 544
- [4] ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2016, 17 (03): : 189 - 205
- [5] Challenges of Composing XACML Policies 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 234 - 241
- [6] Evaluating Distributed XACML Policies SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, 2007, : 99 - 110
- [7] Towards Efficient Evaluation of XACML Policies 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 164 - 171
- [8] WiP: Enhancing the Comprehension of XACML Policies PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 41 - 46
- [9] XACML policies for exclusive resource usage DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 275 - +
- [10] A Toolchain for Designing and Testing XACML Policies 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2013), 2013, : 495 - +