Author:
Morisset Charles,Groß Thomas,van Moorsel Aad,Yevseyeva Iryna
Publisher
Springer International Publishing
Reference26 articles.
1. Bellman, R.: A markovian decision process. In. Univ. Math. J. 6, 679–684 (1957)
2. Bruns, G., Huth, M.: Access-control policies via belnap logic: Effective and efficient composition and analysis. In: Proc. of CSF 2008, pp. 163–176 (2008)
3. Bundy, A., Grov, G., Jones, C.: Learning from experts to aid the automation of proof search. In: AVoCS 2009, vol. CSR-2-2009, pp. 229–232 (September 2009)
4. Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: Proceedings of S&P 2007, pp. 222–230. IEEE (2007)
5. Lecture Notes in Computer Science;L. Coventry,2014
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献