共 50 条
- [1] Dependent Type Theory for Verification of Information Flow and Access Control Policies [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2013, 35 (02):
- [2] A typed access control model for CORBA [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 88 - 105
- [3] Access Control of Federated Information Systems [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 119 - 130
- [7] Control Operation Flow for Mobile Access Control with the Use of MABAC Model [J]. TOWARDS A SYNERGISTIC COMBINATION OF RESEARCH AND PRACTICE IN SOFTWARE ENGINEERING, 2018, 733 : 179 - 192
- [8] Session Types for Access and Information Flow Control [J]. CONCUR 2010 - CONCURRENCY THEORY, 2010, 6269 : 237 - +
- [9] Access Control and Information Flow in Transactional Memory [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 316 - +
- [10] Fine granularity access rights for information flow control in object oriented systems [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 122 - 128