Author:
Davari Maryam,Zulkernine Mohammad
Publisher
Springer Nature Switzerland
Reference27 articles.
1. https://www.oasis-open.org/ XACML references and products, version 1.85. https://www.oasis-open.org/committees/download.php/42588/xacmlRefs-V1-85.html#Products. (Accessed 28 Dec 2021)
2. Chawla, N.V., Bowyer, K.W., Hall, L.W., Kegelmeyer, W.P.: Synthetic minority over-sampling technique: SMOTE. J. Artifi. Intell. Res. 16, 321–357 (2002)
3. Lecture Notes in Computer Science;M Davari,2022
4. Dawson, S., Qian, S., Samarati, P.: Providing security and interoperation of heterogeneous systems. In: Security of Data and Transaction Processing, pp. 119–145. Springer (2000). https://doi.org/10.1007/978-1-4615-4461-6_5
5. Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: Proceedings of the 27th International Conference on Software Engineering, pp. 196–205 (2005)