共 50 条
- [1] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
- [2] XACSim: a new tool for measuring similarity of XACML security policies CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3957 - 3972
- [3] A Formal Approach to Automatic Testing of Security Policies Specified in XACML FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 367 - 374
- [4] XACSim: a new tool for measuring similarity of XACML security policies Cluster Computing, 2023, 26 : 3957 - 3972
- [5] Directed Acyclic Graph Modeling of Security Policies for Firewall Testing 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 393 - 398
- [6] Using OWL Reasoning for Evaluating XACML Policies E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2015, 2016, 585 : 343 - 363
- [8] An implementation of a privacy enforcement scheme based on the Java']Java Security Framework using XACML policies PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 157 - 171