Author:
Dougherty Daniel J.,Fisler Kathi,Krishnamurthi Shriram
Publisher
Springer Berlin Heidelberg
Reference44 articles.
1. Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
2. Abiteboul, S., Vianu, V., Fordham, B.S., Yesha, Y.: Relational transducers for electronic commerce. Journal of Computer and System Sciences 61(2), 236–269 (2000)
3. Ahmed, T., Tripathi, A.R.: Static verification of security requirements in role based CSCW systems. In: Symposium on Access Control Models and Technologies, pp. 196–203 (2003)
4. Backes, M., Karjoth, G., Bagga, W., Schunter, M.: Efficient comparison of enterprise privacy policies. In: Symposium on Applied Computing, pp. 375–382 (2004)
5. Becker, M.Y., Sewell, P.: Cassandra: Flexible trust management, applied to electronic health records. In: IEEE Computer Security Foundations Workshop (2004)
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies;Proceedings of the ACM Web Conference 2024;2024-05-13
2. No Root Store Left Behind;Proceedings of the 22nd ACM Workshop on Hot Topics in Networks;2023-11-28
3. Quantitative Policy Repair for Access Control on the Cloud;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
4. Access Control Enforcement Architectures for Dynamic Manufacturing Systems;2023 IEEE 20th International Conference on Software Architecture (ICSA);2023-03
5. From SMT to ASP: Solver-Based Approaches to Solving Datalog Synthesis-as-Rule-Selection Problems;Proceedings of the ACM on Programming Languages;2023-01-09