Author:
Hughes Graham,Bultan Tevfik
Publisher
Springer Science and Business Media LLC
Subject
Information Systems,Software
Reference37 articles.
1. Abad-Peiro, J.L., Debar, H., Schweinberger, T., Trommler, P.: PLAS—Policy language for authorizations. Technical Report RZ 3126, IBM Research Division (1999)
2. Abadi M., Burrows M., Lampson B., Plotkin G.: A calculus for access control in distributed systems. ACM Trans. Programm. Lang. Syst. 15(4), 706–734 (1993)
3. Bertino E., Bettini C., Ferrari E., Samarati P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23(3), 231–285 (1998)
4. Bonatti, P., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: An access control model for data archives. In: Proceedings of the 16th International Conference on Information Security: Trusted Information, pp. 261–276. Kluwer International Federation For Information Processing Series Paris, France (2001)
5. Bonatti P., De Capitani di Vimercati S., Samarati P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1), 1–35 (2002)
Cited by
65 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization;Proceedings of the ACM on Programming Languages;2024-04-29
2. Ambit: Verification of Azure RBAC;Proceedings of the 2023 on Cloud Computing Security Workshop;2023-11-26
3. Formal Analysis of Access Control Mechanism of 5G Core Network;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. Quantitative Policy Repair for Access Control on the Cloud;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
5. SMT-Based Verification of NGAC Policies;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06