共 50 条
- [1] Authorization Constraints Specification and Enforcement [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 38 - 50
- [3] Authorization Enforcement Usability Case Study [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 209 - 220
- [4] Retrofitting legacy code for authorization policy enforcement [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 214 - +
- [5] Authorization Constraint Enforcement for Information System Security [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 3501 - 3506
- [6] Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 741 - 742
- [7] Secure Access for MANET Using Authorization Enforcement Facility [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 212 - 216
- [8] Specification and Enforcement of Dynamic Authorization Policies oriented by Situations [J]. 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
- [9] The PRIMA system for privilege management, authorization and enforcement in grid environments [J]. FOURTH INTERNATIONAL WORKSHOP ON GRID COMPUTING, PROCEEDINGS, 2003, : 109 - 116
- [10] Context based enforcement of authorization for privacy and security in identity management [J]. POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 25 - 37