共 50 条
- [1] Mining Attribute-Based Access Control Policies INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [3] Deconflicting policies in attribute-based access control systems 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
- [4] Attribute-based access control policies composition algebra Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
- [5] Evolutionary Inference of Attribute-Based Access Control Policies EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
- [6] Using attribute-based access control to enable attribute-based messaging 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
- [7] Attribute Expressions, Policy Tables and Attribute-Based Access Control PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
- [8] Mining Attribute-Based Access Control Policies from RBAC Policies 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [9] Towards Attribute-Based Access Control Policy Engineering Using Risk RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 80 - 90
- [10] On the Feasibility of Attribute-Based Access Control Policy Mining 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252