共 50 条
- [31] A secure mediator for integrating multiple level access control policies KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2008, 5178 : 354 - 362
- [32] Secure data access control with perception reasoning ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2018, 7 (01): : 13 - 28
- [33] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 257 - +
- [34] Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 105 - 116
- [35] Data Sharing in Presence of Access Control Policies ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 301 - 309
- [36] Specifying access control policies on data streams ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 410 - +
- [37] Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies 2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 198 - 202
- [38] Secure authorization, access control and data integrity in Bluetooth 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON 2002), PROCEEDINGS, 2002, : 428 - 433
- [39] Secure access control to hidden data by biometric features MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
- [40] Data Querying and Access Control for Secure Multiparty Computation 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 171 - 179