共 50 条
- [1] Authorization constraints specification of RBAC [J]. INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 266 - 276
- [2] Specification and Enforcement of Dynamic Authorization Policies oriented by Situations [J]. 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
- [3] Specification and enforcement of classification and inference constraints [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 181 - 195
- [4] Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing [J]. INFORMATION SYSTEMS SECURITY, 2011, 7093 : 102 - 115
- [5] XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 442 - 449
- [6] Authorization Enforcement Detection [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
- [7] Role-based authorization constraints specification using object constraint language [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 157 - 162
- [9] Authorization Enforcement Usability Case Study [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 209 - 220
- [10] Authorization Specification of Usage Control with CPN [J]. 2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 88 - 92