共 50 条
- [21] Hybrid Cryptographic Access Control for Cloud-Based EHR Systems IEEE CLOUD COMPUTING, 2016, 3 (04): : 58 - 64
- [22] Uniform application-level access control enforcement of organizationwide policies 21st Annual Computer Security Applications Conference, Proceedings, 2005, : 389 - 398
- [23] Efficient IRM enforcement of history-based access control policies Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09, 2009, : 35 - 46
- [24] Securing programs via modeling and efficient enforcement of access control policies 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2118 - +
- [26] Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 576 - 583
- [27] Access control enforcement on query-aware encrypted cloud databases 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
- [28] On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 819 - 838
- [29] Using Semantics for Automatic Enforcement of Access Control Policies among Dynamic Coalitions SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 235 - 244
- [30] Seamless secure development of systems: From Modeling to enforcement of access control policies 2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 799 - +