共 50 条
- [31] Conformance Checking of Dynamic Access Control Policies FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 227 - 242
- [32] Composing access control policies of distributed components DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 301 - +
- [33] A framework for automated negotiation of access control policies DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 216 - 221
- [34] On the Incoherencies in Web Browser Access Control Policies 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 463 - 478
- [36] Adaptive Access Control Policies for IoT Deployments 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 377 - 383
- [37] Data Sharing in Presence of Access Control Policies ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 301 - 309
- [38] Aggregating and deploying network access control policies ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 532 - +
- [39] Algebraic Model for Handling Access Control Policies 7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 653 - 657
- [40] Oblivious Transfer with Hidden Access Control Policies PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +