共 50 条
- [41] Field access analysis for enforcing access control policies EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
- [42] Adventures in the Analysis of Access Control Policies FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 467 - 482
- [43] Testing Access Control and Obligation Policies 2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
- [44] Automated decomposition of access control policies SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 3 - 13
- [45] Access Control Policies for Semantic Networks 2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 150 - 157
- [46] Verification and enforcement of access control policies Formal Methods in System Design, 2013, 43 : 450 - 492
- [47] Policies, models, and languages for access control DATABASES IN NETWORKED INFORMATION SYSTEMS, PROCEEDINGS, 2005, 3433 : 225 - 237
- [48] Quantifying Permissiveness of Access Control Policies 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 1805 - 1817
- [49] Testing and analysis of access control policies 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS, 2007, : 75 - 76
- [50] Formal analysis of access control policies PROCEEDINGS OF THE UK E-SCIENCE ALL HANDS MEETING 2006, 2006, : 701 - 708