共 50 条
- [21] Security Analysis of Role-Based Access Control through Program Verification 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
- [22] A policy based framework for access control INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 47 - 59
- [24] AKER: A Design and Verification Framework for Safe and Secure SoC Access Control 2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD), 2021,
- [26] A Dynamic Mandatory Access Control Model ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 862 - 866
- [27] Mandatory access control in clustered servers 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 143 - 149
- [28] Mandatory access control in workflow systems KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2000, 62 : 247 - 254
- [29] Mandatory Access Control for Android Application 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 299 - 300
- [30] Correctness verification of synchronization based workflow model ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 527 - 530