Author:
Bui Thang,Stoller Scott D.,Sharma Shikhar
Publisher
Springer International Publishing
Reference22 articles.
1. Alzahrani, A., Janicke, H., Abubaker, S.: Decentralized XACML overlay network. In: Proceedings of the 10th IEEE International Conference on Computer and Information Technology (CIT 2010), pp. 1032–1037. IEEE Computer Society (2010)
2. American National Standards Institute (ANSI), International Committee for Information Technology Standards (INCITS): Role-based access control. ANSI INCITS Standard, pp. 359–2004, February 2004
3. Becker, M.Y.: Specification and analysis of dynamic authorisation policies. In: Proceedings 22nd IEEE Computer Security Foundations Symposium (CSF), pp. 203–217. IEEE Computer Society (2009)
4. Becker, M.Y., Nanz, S.: A logic for state-modifying authorization policies. ACM Trans. Inf. Syst. Secur. 13(3), 20:1–20:28 (2010)
5. Brewer, D.F.C., Nash, M.J.: The Chinese wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206–214. IEEE Computer Society (1989)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient Access Control Permission Decision Engine Based on Machine Learning;Security and Communication Networks;2021-02-17
2. PolTree;Proceedings of the 24th ACM Symposium on Access Control Models and Technologies;2019-05-28
3. A distributed PDP model based on spectral clustering for improving evaluation performance;World Wide Web;2018-05-22