Author:
Koch Manuel,Mancini Luigi V.,Parisi-Presicce Francesco
Publisher
Springer Berlin Heidelberg
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SMT-Based Verification of NGAC Policies;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06
2. An analysis of graphs that represent a role-based security policy hierarchy;Journal of Computer Security;2015-09-25
3. Sesqui-Pushout Rewriting;Lecture Notes in Computer Science;2006
4. Graph-based specification of access control policies;Journal of Computer and System Sciences;2005-07
5. Representation and Reasoning on RBAC: A Description Logic Approach;Theoretical Aspects of Computing – ICTAC 2005;2005