共 50 条
- [1] Attribute-Based Access Control Architectures with the eIDAS Protocols [J]. SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
- [3] Using attribute-based access control to enable attribute-based messaging [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
- [5] DACAS: integration of attribute-based access control for northbound interface security in SDN [J]. World Wide Web, 2023, 26 : 2143 - 2173
- [6] DACAS: integration of attribute-based access control for northbound interface security in SDN [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (04): : 2143 - 2173
- [7] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [8] Monotonicity and Completeness in Attribute-Based Access Control [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
- [9] ABACaaS: Attribute-Based Access Control as a Service [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155