Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference34 articles.
1. Ahn G-J, Hu H, Lee J, Meng Y (2010) Representing and reasoning about web access control policies. In: 2010 IEEE 34th annual computer software and applications conference. IEEE, pp 137–146
2. Arlitt M, Marwah M, Bellala G, Shah A, Healey J, Vandiver B (2015) IoTAbench: an internet of things analytics benchmark. In: Proceedings of the 6th ACM/SPEC international conference on performance engineering. ACM, pp 133–144
3. AU2EU (2015) Authentication and authorisation for entrusted unions. http://www.au2eu.eu/
4. Ayed D, Lepareux M-N, Martins C (2015) Analysis of XACML policies with ASP. In: 2015 7th international conference on new technologies, mobility and security (NTMS). IEEE, pp 1–5
5. Butler B, Jennings B (2015) Measurement and prediction of access control policy evaluation performance. IEEE Trans Netw Serv Manag 12(4):526–539
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献