Author:
Hwang JeeHyun,Xie Tao,Hu Vincent,Altunay Mine
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: Proc. 27th International Conference on Software Engineering, pp. 196–205 (2005)
2. Hughes, G., Bultan, T.: Automated verification of access control policies. Technical Report 2004-22, Department of Computer Science, University of California, Santa Barbara (2004)
3. OASIS eXtensible Access Control Markup Language, XACML (2009), http://www.oasis-open.org/committees/xacml/
4. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder policy specification language. In: Proc. International Workshop on Policies for Distributed Systems and Networks, pp. 18–38 (2001)
5. Martin, E., Hwang, J., Xie, T., Hu, V.: Assessing quality of policy properties in verification of access control policies. In: Proc. Annual Computer Security Applications Conference, pp. 163–172 (2008)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ACMiner;Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy;2019-03-13
2. Towards Adaptive Access Control;Data and Applications Security and Privacy XXXII;2018