共 50 条
- [21] Using microsoft office infopath to generate XACML policies SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 379 - +
- [22] XACML-Based composition policies for ambient networks EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 77 - +
- [23] Analyzing XACML policies using answer set programming International Journal of Information Security, 2019, 18 : 465 - 479
- [24] Conformance checking of access control policies specified in XACML COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 275 - +
- [26] Using Microsoft Office InfoPath to Generate XACML Policies E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2008, 9 : 134 - +
- [27] Managing the lifecycle of XACML delegation policies in federated environments PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 717 - +
- [29] Deriving XACML policies from business process models WEB INFORMATION SYSTEMS ENGINEERING - WISE 2007 WORKSHOPS, 2007, 4832 : 142 - +