共 50 条
- [1] Mining Relationship-Based Access Control Policies PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 239 - 246
- [2] Active Learning of Relationship-Based Access Control Policies SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 155 - 166
- [3] Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 135 - 140
- [5] Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 267 - 284
- [6] Security Analysis of Relationship-Based Access Control Policies PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
- [8] Cryptographic Protocols for Enforcing Relationship-based Access Control Policies 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 484 - 493
- [9] A Datalog Framework for Modeling Relationship-based Access Control Policies PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 91 - 102
- [10] Efficient and Extensible Policy Mining for Relationship-Based Access Control PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 161 - 172