Author:
Crampton Jason,Williams Conrad
Publisher
Springer International Publishing
Reference16 articles.
1. Alqatawna, J., Rissanen, E., Firozabadi, B.S.: Overriding of access control in XACML. In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), pp. 87–95. IEEE Computer Society (2007).
http://doi.ieeecomputersociety.org/10.1109/POLICY.2007.31
2. Ardagna, C.A., di Vimercati, S.D.C., Foresti, S., Grandison, T., Jajodia, S., Samarati, P.: Access control for smarter healthcare using policy spaces. Comput. Secur. 29(8), 848–858 (2010).
http://dx.doi.org/10.1016/j.cose.2010.07.001
3. Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 197–206 (2009)
4. Cheng, P., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), pp. 222–230. IEEE Computer Society (2007).
http://dx.doi.org/10.1109/SP.2007.21
5. Lecture Notes in Computer Science;J Crampton,2010
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献