共 50 条
- [33] Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 212 - 217
- [34] In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 59 - 70
- [37] Securing Smart Home IoT Systems with Attribute-Based Access Control [J]. SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 37 - 46
- [38] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [39] Monotonicity and Completeness in Attribute-Based Access Control [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
- [40] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214