共 50 条
- [1] Mining Positive and Negative Attribute-Based Access Control Policy Rules [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 161 - 172
- [2] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [4] Attribute Expressions, Policy Tables and Attribute-Based Access Control [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
- [5] On the Feasibility of Attribute-Based Encryption for WLAN Access Control [J]. 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
- [8] Attribute-based lightweight reconfigurable access control policy [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
- [9] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [10] VisMAP: Visual Mining of Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98