Author:
Martinelli Fabio,Michailidou Christina,Osliak Oleksii,Rosetti Alessandro,Marra Antonio La,Dimitrakos Theo
Publisher
Springer International Publishing
Reference19 articles.
1. Amazon Web Services, I.: Amazon web services: Overview of security processes. https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf. Accessed 01 Jul 2019
2. Amazon Web Services, I.: Aws identity and access management: user guide. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html. Accessed 09 Jul 2019
3. Anderson, A., et al.: Extensible access control markup language (XACML) version 1.0. OASIS (2003)
4. Ardagna, C., De, S., Vimercati, C.: Comparison of modeling strategies in defining xml-based access control languages. In: Computer Systems Science and Engineering, vol. 19, no. 3. Citeseer (2004)
5. Batty, M.: Data about cities: redefining big, recasting small. In: Data and the City, pp. 31–43. Routledge (2017)