共 50 条
- [41] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
- [42] POSTER: Analyzing Access Control Policies with SMT CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1508 - 1510
- [43] An XACML Extension for Business Process-centric Access Control Policies 2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 166 - +
- [47] Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015), 2015, : 163 - 172
- [48] SMT-Based Verification of NGAC Policies 2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 860 - 869