Author:
Zhang Nan,Ryan Mark,Guelev Dimitar P.
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29, 38–47 (1996)
2. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., U.S.A. (2001)
3. Lecture Notes in Computer Science;D.P. Guelev,2004
4. Zhang, N., Ryan, M., Guelev, D.P.: Synthesising verified access control systems in XACML. In: The 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, pp. 56–65. ACM Press, New York (2004)
5. Godik, S., Moses, T.: eXtensible Access Control Markup Language. OASIS committee. 1.1 edn, Committee specification (2003)
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. From features to roles;Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A;2020-10-19
2. XACMET: XACML Testing & Modeling;Software Quality Journal;2020-03
3. Methods and Tools for Policy Analysis;ACM Computing Surveys;2019-11-30
4. A correct-by-construction model for attribute-based access control;Cluster Computing;2019-08-28
5. A framework for the extended evaluation of ABAC policies;Cybersecurity;2019-02-08