Author:
Huang Hejiao,Kirchner Hélène
Publisher
Springer Berlin Heidelberg
Reference54 articles.
1. Astesiano, E., Bidoit, M., Kirchner, H., Krieg-Brückner, B., Mosses, P.D., Sannella, D., Tarlecki, A.: Casl: the common algebraic specification language. Theor. Comput. Sci. 286(2), 153–196 (2002)
2. Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec, pp. 179–193 (2006)
3. Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: PLDI, pp. 305–314 (2005)
4. Bell, D., LaPadula, L.: Secure computer systems: A mathematical model. Journal of Computer Security ii. 4(2/3), 229–263 (1996)
5. Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23(3), 231–285 (1998)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Survey on CPN Applications in Cloud Computing;Advances in Computer Science and Ubiquitous Computing;2016-11-23