共 50 条
- [2] Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents [J]. Computers, Materials and Continua, 2024, 80 (03): : 3881 - 3902
- [3] Towards an Automated Extraction of ABAC Constraints from Natural Language Policies [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 105 - 119
- [4] Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC) [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 320 - 328
- [5] Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 110 - 125
- [6] Mining Attribute-Based Access Control Policies from RBAC Policies [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [7] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [8] CA-ABAC: Class Algebra Attribute-Based Access Control [J]. 2012 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY WORKSHOPS (WI-IAT WORKSHOPS 2012), VOL 3, 2012, : 220 - 225
- [10] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291