共 50 条
- [21] XACML policies for exclusive resource usage DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 275 - +
- [22] A Toolchain for Designing and Testing XACML Policies 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2013), 2013, : 495 - +
- [23] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
- [24] Towards a Theory on Testing XACML Policies PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 103 - 114
- [27] Approaches for Testing and Evaluation of XACML Policies INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 101 - 111
- [30] Automated Strong Mutation Testing of XACML Policies SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 105 - 116