共 50 条
- [12] A Framework for the Cryptographic Enforcement of Information Flow Policies PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 143 - 154
- [13] A Dynamic Cryptographic Access Control Scheme in Cloud Storage Services 2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 50 - 55
- [14] An Algebra for Composing Access Control Policies in Cloud INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
- [16] From Formal Access Control Policies to Runtime Enforcement Aspects ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 16 - +
- [17] Automatic enforcement of access control policies among dynamic coalitions DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 369 - 378
- [19] Cryptographic Protocols for Enforcing Relationship-based Access Control Policies 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 484 - 493
- [20] Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 341 - 356