共 50 条
- [11] Protecting personal data with various granularities: A logic-based access control approach [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 548 - 553
- [12] Constraining Credential Usage in Logic-Based Access Control [J]. 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 154 - 168
- [13] Semantic-aware Comment Analysis Approach for API Permission Mapping on Android [J]. ACM International Conference Proceeding Series, 2020, : 61 - 69
- [14] Semantic-aware Comment Analysis Approach for API Permission Mapping on Android [J]. 2020 4TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING AND INFORMATION RETRIEVAL, NLPIR 2020, 2020, : 61 - 69
- [17] Logic and logic-based control [J]. Journal of Control Theory and Applications, 2008, 6 (01): : 26 - 36
- [18] A Semantic-Aware Approach for Automatic Cloud Services Composition [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (08): : 181 - 195
- [19] LOGIC-BASED CONFIGURATION WITH A SEMANTIC NETWORK [J]. JOURNAL OF LOGIC PROGRAMMING, 1990, 8 (1-2): : 53 - 73