共 50 条
- [1] Attribute Expressions, Policy Tables and Attribute-Based Access Control [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
- [2] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [4] Deconflicting policies in attribute-based access control systems [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
- [5] Attribute-based access control policies composition algebra [J]. Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
- [6] Evolutionary Inference of Attribute-Based Access Control Policies [J]. EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
- [7] Mining Attribute-Based Access Control Policies from RBAC Policies [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [8] Specification and Analysis of Attribute-Based Access Control Policies: An Overview [J]. 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
- [9] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291