共 50 条
- [21] Implementing ACL-based Policies in XACML 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 183 - 192
- [23] Automated Coverage-Based Testing of XACML Policies SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 3 - 14
- [24] Use of XACML Policies for a Network Access Control Service APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 111 - 122
- [25] An Algebra for Fine-Grained Integration of XACML Policies SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 63 - 72
- [26] Using microsoft office infopath to generate XACML policies SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 379 - +
- [27] XACML-Based composition policies for ambient networks EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 77 - +
- [28] Analyzing XACML policies using answer set programming International Journal of Information Security, 2019, 18 : 465 - 479
- [29] Towards Efficient Evaluation of ABAC Policies using High-Dimensional Indexing Techniques 2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 243 - 251
- [30] Conformance checking of access control policies specified in XACML COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 275 - +