Author:
Dulay Naranker,Damianou Nicodemos,Lupu Emil,Sloman Morris
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Bertino, E., Buccafurri, F., Ferrari, E., and Rullo, P.: A Logical Framework for Reasoning on Data Access Control Policies, In Proceeding of the 12th IEEE Computer Security Workshop, IEEE Computer Society Press, 1999.
2. Blaze, M., Ioannidis, J., Keromytis, A.D.: Trust Management and Network Layer Security Protocols, In Cambridge Protocols Workshop. Cambridge. Available from http://www.crypto.com/papers/networksec.pdf , 1999.
3. Lect Notes Comput Sci;A. Corradi,2001
4. Cuppens, F., Saurel, C.: Specifying a security policy: A Case Study. In IEEE Computer Society Computer Security Foundations Workshop (CSFW9), 1996, 123–135.
5. Lect Notes Comput Sci;N. Damianou,2001
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献