共 50 条
- [21] Analysis of XACML policies with SMT Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 115 - 134
- [22] Challenges of Composing XACML Policies 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 234 - 241
- [23] Analysis of XACML Policies with ASP 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
- [24] Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies at Design Level SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 120 - 135
- [25] Evaluating Distributed XACML Policies SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, 2007, : 99 - 110
- [26] Graph Modeling from Relational Databases 2017 XLIII LATIN AMERICAN COMPUTER CONFERENCE (CLEI), 2017,
- [27] A Method for Modeling a Schema for Graph Databases DIGITAL PRESENTATION AND PRESERVATION OF CULTURAL AND SCIENTIFIC HERITAGE, 2018, 8 : 99 - 104
- [28] Improving Game Modeling for the Quoridor Game State Using Graph Databases PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY & SYSTEMS (ICITS 2018), 2018, 721 : 333 - 342
- [29] CANONICAL SECURITY MODELING FOR FEDERATED DATABASES IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 25 : 207 - 222
- [30] Modeling contextual security policies International Journal of Information Security, 2008, 7 : 285 - 305