共 50 条
- [33] Context-dependent access control for contextual information ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 155 - +
- [34] CONFLICTS BETWEEN GEOXACML ACCESS CONTROL POLICIES IN GEOGRAPHIC INFORMATION SYSTEMS IADIS-INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 9 (01): : 16 - 29
- [35] An integrated model for access control and information flow requirements ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 111 - 125
- [36] Specification and Verification of Access Control Policies in EB3SEC: Work in Progress FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 227 - +
- [38] Access Control Encryption: Enforcing Information Flow with Cryptography THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 547 - 576
- [39] A Model for Specification, Composition and Verification of Access Control Policies and Its Application to Web Services ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (02): : 103 - 120
- [40] Nickel: A Framework for Design and Verification of Information Flow Control Systems PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 287 - 305