共 50 条
- [1] Authorization Enforcement Detection [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
- [2] Authorization Constraints Specification and Enforcement [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 38 - 50
- [4] Federated Authentication and Authorization: A Case Study [J]. EDOC 2008: 12TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING, PROCEEDINGS, 2008, : 356 - +
- [5] Authorization Constraint Enforcement for Information System Security [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 3501 - 3506
- [6] Retrofitting legacy code for authorization policy enforcement [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 214 - +
- [8] Designing for usability: A case study [J]. HUMAN-COMPUTER INTERACTION - INTERACT '97, 1997, : 31 - 38
- [9] iKnow Usability: A Case Study [J]. 2016 24TH TELECOMMUNICATIONS FORUM (TELFOR), 2016, : 810 - 813
- [10] Specification and Enforcement of Dynamic Authorization Policies oriented by Situations [J]. 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,