共 50 条
- [41] From Authorization Logics to Types for Authorization [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2008, 5356 : 255 - 255
- [43] An XACML Extension for Business Process-centric Access Control Policies [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 166 - +
- [45] Identify Authorization Control Requirement in Business Collaboration [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 561 - 562
- [48] Pattern templates for automating business choreography on Web services [J]. 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 512 - +
- [49] Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1964 - 1970
- [50] Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 741 - 742