共 50 条
- [21] Mining Positive and Negative Attribute-Based Access Control Policy Rules [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 161 - 172
- [22] Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 242 - 260
- [25] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
- [26] An ontology-based approach to improve access policy administration of attribute-based access control [J]. International Journal of Information and Computer Security, 2019, 11 (4-5): : 391 - 412
- [28] Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 212 - 217
- [30] In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 59 - 70