Author:
Shehab Mohamed,Al-Haj Saeed,Bhagurkar Salil,Al-Shaer Ehab
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Ahn, G.-J., Hu, H.: Towards realizing a formal RBAC model in real systems. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 215–224. ACM, New York (2007)
2. Al-Shaer, E.S., Hamed, H.H.: Discovery of policy anomalies in distributed firewalls. In: INFOCOM 2004, vol. 4 (March 2004)
3. Application Security Inc. Database security tips for 2012 (2011),
http://www.appsecinc.com/santa-breach/Database_Security_Tips_2012.pdf
4. Brace, K.S., Rudell, R.L., Bryant, R.E.: Efficient implementation of a BDD package. In: Proceedings of the 27th ACM/IEEE Design Automation Conference, DAC 1990, pp. 40–45. ACM, New York (1990)
5. Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. 35, 677–691 (1986)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献