1. Access control based on execution history;Abadi,2003
2. A survey on system attack models;Ajay;Bonfring Int J Res Commun Eng,2012
3. AspectJ-based idioms for flexible feature binding;Andrade,2013
4. On modeling and testing security properties of vehicular networks;Aouadi,2014
5. A formal approach to automatic testing of security policies specified in xacml;Aouadi,2015