Author:
Martínez Salvador,Garcia-Alfaro Joaquin,Cuppens Frédéric,Cuppens-Boulahia Nora,Cabot Jordi
Publisher
Springer International Publishing
Reference19 articles.
1. Bauer, L., Appel, A.W.: Access Control for the Web via Proof-Carrying Authorization. PhD thesis, Princeton University (2003)
2. Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An Algebra for Composing Access Control Policies. TISSEC 5(1), 1–35 (2002)
3. Casalino, M.M., Thion, R.: Refactoring multi-layered access control policies through (de)composition. In: CNSM, pp. 243–250 (2013)
4. Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miège, A.: A formal approach to specify and deploy a network security policy. In: FAST 2004, pp. 203–218 (2004)
5. Davy, S., Jennings, B., Strassner, J.: The Policy Continuum-Policy Authoring and Conflict Analysis. Computer Communications 31(13), 2981–2995 (2008)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Approaches in Model-Driven Engineering for Web Applications: the State-of-the-art in the Last 10 Years;2024 IEEE 32nd International Requirements Engineering Conference Workshops (REW);2024-06-24
2. Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain;2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA);2021-12
3. Model-based analysis of Java EE web security misconfigurations;Computer Languages, Systems & Structures;2017-09