共 50 条
- [41] Modeling and Enforcing Integrity Constraints on Graph Databases DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT I, 2020, 12391 : 269 - 284
- [43] Approaches for Testing and Evaluation of XACML Policies INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 101 - 111
- [44] A Security Model for Access Control in Graph-Oriented Databases 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 135 - 142
- [45] On The Modeling. of Bell-LaPadula Security Policies Using RBAC 17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 257 - 262
- [48] Automated Strong Mutation Testing of XACML Policies SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 105 - 116
- [49] Using Functional Dependencies in Conversion of Relational Databases to Graph Databases DATABASE AND EXPERT SYSTEMS APPLICATIONS (DEXA 2018), PT II, 2018, 11030 : 350 - 357
- [50] Implementing ACL-based Policies in XACML 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 183 - 192