共 50 条
- [1] Towards a Theory on Testing XACML Policies PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 103 - 114
- [2] Approaches for Testing and Evaluation of XACML Policies INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 101 - 111
- [3] Analysis of XACML policies with SMT Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 115 - 134
- [4] Challenges of Composing XACML Policies 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 234 - 241
- [6] Analysis of XACML Policies with ASP 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
- [8] Integrity-Preserving and Efficient Policy Evaluation for XACML International Journal of Network Security, 2022, 24 (02): : 262 - 272
- [9] Evaluating Distributed XACML Policies SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, 2007, : 99 - 110
- [10] An ACO-based Algorithm for Efficient XACML Policy Evaluation PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ARTIFICIAL INTELLIGENCE (CAAI 2017), 2017, 134 : 282 - 288