共 50 条
- [1] Distributed proving in access-control systems [J]. 2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 81 - 95
- [2] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
- [4] DISCRETIONARY ACCESS-CONTROL BY MEANS OF USAGE CONDITIONS [J]. COMPUTERS & SECURITY, 1994, 13 (05) : 437 - 450
- [5] Efficient proving for practical distributed access-control systems [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 19 - +
- [6] CONTEXT-DEPENDENT ACCESS-CONTROL IN DISTRIBUTED SYSTEMS [J]. COMPUTER SECURITY, 1993, 37 : 137 - 155
- [7] Detecting and Resolving Policy Misconfigurations in Access-Control Systems [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 185 - 194
- [8] AUTHENTICATION AND DISCRETIONARY ACCESS-CONTROL IN COMPUTER-NETWORKS [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1985, 10 (01): : 27 - 37
- [10] Specifying and reasoning about dynamic access-control policies [J]. AUTOMATED REASONING, PROCEEDINGS, 2006, 4130 : 632 - 646