共 50 条
- [43] Efficient enforcement of security policies based on tracking of mobile users DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 237 - 251
- [45] Security policies enforcement using finite and pushdown edit automata International Journal of Information Security, 2013, 12 : 319 - 336
- [46] A Decentralized Authorization and Security Framework for Distributed Research Workflows 2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 741 - 746
- [48] Distributed enforcement of unlinkability policies: Looking beyond the Chinese wall EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 141 - +
- [49] A Question of Access: decentralized control and communication strategies for security policies WODES 2006: EIGHTH INTERNATIONAL WORKSHOP ON DISCRETE EVENT SYSTEMS, PROCEEDINGS, 2006, : 58 - +
- [50] Enforcing security policies for distributed objects applications SECURITY PROTOCOLS, 2005, 3364 : 119 - 133