Author:
Batra Gunjan,Atluri Vijayalakshmi,Vaidya Jaideep,Sural Shamik
Publisher
Springer International Publishing
Reference21 articles.
1. Agrawal, D., Giles, J., Lee, K.W., Lobo, J.: Policy ratification. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 223–232 (2005)
2. Backes, M., Karjoth, G., Bagga, W., Schunter, M.: Efficient comparison of enterprise privacy policies. In: ACM Symposium on Applied Computing, pp. 375–382 (2004)
3. Barker, S.: The next 700 access control models or a unifying meta-model? In: ACM SACMAT, pp. 187–196 (2009)
4. Lecture Notes in Computer Science;G Batra,2018
5. Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM TISSEC 6(1), 71–127 (2003)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献