Author:
Chakraborty Shuvra,Sandhu Ravi
Publisher
Springer International Publishing
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The $$\mathrm {ACAC_{D}}$$ model for mutable activity control and chain of dependencies in smart and connected systems;International Journal of Information Security;2024-07-20
2. Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24
3. Optimization of Access Control Policies;Journal of Information Security and Applications;2022-11
4. GNN-based Method for Predicting Access Control Relationships for Big Data;2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI);2022-09-23
5. Effective Evaluation of Relationship-Based Access Control Policy Mining;Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies;2022-06-07