共 50 条
- [41] Use of XACML Policies for a Network Access Control Service APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 111 - 122
- [42] An Algebra for Fine-Grained Integration of XACML Policies SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 63 - 72
- [43] XACML-Based composition policies for ambient networks EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 77 - +
- [44] Conformance checking of access control policies specified in XACML COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 275 - +
- [45] Managing the lifecycle of XACML delegation policies in federated environments PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 717 - +
- [46] ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2016, 17 (03): : 189 - 205
- [47] Automated Microsoft Office Macro Malware Detection Using Machine Learning 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4448 - 4452
- [49] Deriving XACML policies from business process models WEB INFORMATION SYSTEMS ENGINEERING - WISE 2007 WORKSHOPS, 2007, 4832 : 142 - +