共 50 条
- [41] Specification of constraints in business flow [J]. FOURTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE - PROCEEDINGS, 2000, : 102 - 106
- [42] Modular Specification of Architectural Constraints [J]. PROCEEDINGS OF 2016 X BRAZILIAN SYMPOSIUM ON SOFTWARE COMPONENTS, ARCHITECTURES AND REUSE (SBCARS), 2016, : 31 - 40
- [43] Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 99 - 113
- [45] IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 1094 - 1109
- [46] Cost enforcement in the real-time specification for Java [J]. Real-Time Systems, 2007, 37 : 139 - 179
- [48] Policy specification and enforcement for smart ID cards deployment [J]. 2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 127 - 134
- [49] Towards Software Compliance Specification and Enforcement Using TOSCA [J]. ECONOMICS OF GRIDS, CLOUDS, SYSTEMS, AND SERVICES, GECON 2021, 2021, 13072 : 168 - 177
- [50] Specification & Enforcement of Access Control in Information & Communication Systems [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585