共 50 条
- [41] Adventures in the Analysis of Access Control Policies [J]. FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 467 - 482
- [42] Testing and analysis of access control policies [J]. 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS, 2007, : 75 - 76
- [43] Formal analysis of access control policies [J]. PROCEEDINGS OF THE UK E-SCIENCE ALL HANDS MEETING 2006, 2006, : 701 - 708
- [44] Field access analysis for enforcing access control policies [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
- [46] Specifying and enforcing constraints in dynamic access control policies [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297
- [47] Theoretical Analysis of EDCA Medium Access-Control Method in Simplified Network Environment [J]. 2009 EIGHTH INTERNATIONAL CONFERENCE ON NETWORKS, 2009, : 197 - 201
- [48] DYNAMIC BANDWIDTH ALLOCATION AND ACCESS-CONTROL OF VIRTUAL PATHS IN ATM BROAD-BAND NETWORKS [J]. HIGH PERFORMANCE NETWORKING, IV, 1993, 14 : 49 - 64
- [50] Dynamic Analysis of Usage Control Policies [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 88 - 100