共 50 条
- [41] XACSim: a new tool for measuring similarity of XACML security policies CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3957 - 3972
- [42] Coverage-based Test Cases Selection for XACML Policies 2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 12 - 21
- [43] A Formal Approach to Automatic Testing of Security Policies Specified in XACML FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 367 - 374
- [44] XACSim: a new tool for measuring similarity of XACML security policies Cluster Computing, 2023, 26 : 3957 - 3972
- [45] Formal engineering of XACML access control policies in VDM++ FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4789 : 37 - 56
- [46] Composing administrative scope of delegation policies based on extended XACML 10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 467 - 470
- [49] Towards Learning Efficient Intervention Policies for Wearable Devices 2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, : 298 - 299
- [50] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,