共 50 条
- [31] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214
- [32] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [33] Monotonicity and Completeness in Attribute-Based Access Control [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
- [34] Policy Adaptation in Attribute-Based Access Control for Inter-organizational Collaboration [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 136 - 145
- [36] ABACaaS: Attribute-Based Access Control as a Service [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
- [37] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
- [38] Combining Mandatory and Attribute-based Access Control [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
- [39] A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1832 - 1853
- [40] A contextual attribute-based access control model [J]. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006