1. Access control based on execution history;Abadi,2003
2. Analysis and comparison of access control policies validation mechanisms;Aqib;IJ Comput Netw Inf Secur,2015
3. A goal-based approach to policy refinement;Bandara,2004
4. Assessing network authorization policies via reachability analysis;Basile;Comput Electr Eng,2017
5. A novel approach for integrating security policy enforcement with dynamic network virtualization;Basile,2015