Author:
Ganna Mohamed,Horlait Eric
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Dulay, N., Lupu, E., Sloman, M., Daminanou, N.: A policy Deployment Model for the Ponder Language. In: Proc. of the 7th IFIP/IEEE International Symposium on Integrated Network Management (IM 2001), Seattle, Washington, USA (2001)
2. Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: Proc. of IEEE Symposium on Security and Privacy, pp. 31–42 (1997)
3. Lecture Notes in Computer Science;R. Ortalo,1998
4. Hoagland, J.A., Pandey, R., Levitt, K.N.: Security Policy Specification Using a Graphical Approach. Technical report CSE-98-3, UC Davis Computer Science Department (July 22, 1998)
5. Lobo, J., Bhatia, R., Naqvi, S.: A Policy Description Language. In: Proc. of AAAI, Orlando, Florida, USA (July 1999)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献