共 50 条
- [22] Mining Attribute-Based Access Control Policies from RBAC Policies 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [24] A BERT Based Approach to Measure Web Services Policies Compliance With GDPR IEEE ACCESS, 2021, 9 (09): : 148004 - 148016
- [25] A Model-driven Approach to Representing and Checking RBAC Contextual Policies CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 243 - 253
- [26] Delegation model for CSCW based on RBAC policies and visual modeling Proceedings of the 11th Joint International Computer Conference, 2005, : 126 - 130
- [27] Monitoring of compliance risk in the bank 4TH WORLD CONFERENCE ON BUSINESS, ECONOMICS AND MANAGEMENT (WCBEM-2015), 2015, 26 : 800 - 805
- [28] Schema based XML security: RBAC approach DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 330 - 343
- [29] Network security management:: A formal evaluation tool based on RBAC policies NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, III, 2005, 165 : 69 - 80
- [30] RBAC policies in XML for X.509 based privilege management SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 39 - 53