共 50 条
- [22] A policy validation framework for enterprise authorization specification [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 319 - 328
- [23] Deterministic enforcement of constraints [J]. PROGRAMMING AND COMPUTER SOFTWARE, 1998, 24 (02) : 71 - 83
- [24] Deterministic Enforcement of Constraints [J]. Programming and Computer Software (English Translation of Programmirovanie), 24 (02):
- [25] Specification and runtime enforcement of security policies [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 244 - +
- [26] The specification and enforcement of advanced security policies [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 128 - 138
- [27] Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 741 - 742
- [28] Secure Access for MANET Using Authorization Enforcement Facility [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 212 - 216
- [29] Using RDF for policy specification and enforcement [J]. 15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 163 - 167
- [30] Analyzing the Performance Impact of Authorization Constraints and Optimizing the Authorization Methods for Workflows [J]. 2013 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), 2013, : 1 - 9