共 50 条
- [1] Authorization Constraints Specification and Enforcement [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 38 - 50
- [2] Flow policies: Specification and enforcement [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 681 - 686
- [4] Specification and runtime enforcement of security policies [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 244 - +
- [5] Using RDF for policy specification and enforcement [J]. 15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 163 - 167
- [6] The specification and enforcement of advanced security policies [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 128 - 138
- [9] Distributed Enforcement of Integrity Constraints [J]. Distributed and Parallel Databases, 2003, 13 : 227 - 249
- [10] Qualitative constraint enforcement in advanced policy specification [J]. SYMBOLIC AND QUANTITATIVE APPROACHES TO REASONING WITH UNCERTAINTY, PROCEEDINGS, 2007, 4724 : 695 - +