共 50 条
- [2] Attribute Expressions, Policy Tables and Attribute-Based Access Control [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
- [3] On the Feasibility of Attribute-Based Access Control Policy Mining [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
- [4] Attribute-based lightweight reconfigurable access control policy [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
- [5] Policy Extraction and Optimization with Access Logs for Attribute-based Access Control [J]. Journal of Network Intelligence, 2023, 8 (03): : 932 - 947
- [7] Attribute-Based Access Control Policy Review in Permissioned Blockchain [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109
- [9] HGAA: An Architecture to Support Hierarchical Group and Attribute-Based Access Control [J]. PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 1 - 12
- [10] HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 187 - 204