Author:
Bertolissi Clara,Fernández Maribel,Barker Steve
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. In: Proc. 4th ACM Conf. on Computer and Communication Security, pp. 36–47. ACM Press, New York (1997)
2. Abbes, T., Bouhoula, A., Rusinowitch, M.: Protocol analysis in intrusion detection using decision tree. In: Proc. ITCC 2004, pp. 404–408 (2004)
3. Lecture Notes in Computer Science;J. Abendroth,2004
4. Baader, F., Nipkow, T.: Term rewriting and all that. Cambridge University Press, Great Britain (1998)
5. Bacon, J., Moody, K., Yao, W.: A model of OASIS RBAC and its support for active security. TISSEC 5(4), 492–540 (2002)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automatic Conversion of ABAC Policies for RBAC Systems;2023 IEEE Conference on Dependable and Secure Computing (DSC);2023-11-07
2. Inference Rules for Determined Decisions in Policy-Based ABAC Enforcement Systems;2023 7th International Conference on Cryptography, Security and Privacy (CSP);2023-04
3. A Framework for Secure Data Collection and Management for Internet of Things;Proceedings of the 2nd Annual Industrial Control System Security Workshop on - ICSS '16;2016
4. A Typed Language for Events;Logic-Based Program Synthesis and Transformation;2015
5. Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics;Logic-Based Program Synthesis and Transformation;2015