Author:
Belsis Petros,Gritzalis Stefanos,Katsikas Sokratis K.
Subject
General Computer Science,Theoretical Computer Science
Reference13 articles.
1. Flexible access control policy specification with constraint logic programming;Barker;ACM Transactions on Information Systems Security (TISSEC),2001
2. Belsis, P., S. Gritzalis and S. Katsikas, A scalable security architecture enabling coalition formation between autonomous domains, in: 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT05), 2005, pp. 560–566
3. Bharadwaj, V. and J. Baras, Towards automated negotiation of access control policies, in: 4th IEEE International Workshop on Policies (IEEE Policy), 2003, pp. 77–86
4. Bonatti, P., S.D.C. diVimercati and P. Samarati, A modular approach to composing access control policies, in: 7th ACM Conference on Computer and Communications Security (CCS '00), 2000, pp. 164–173
5. Dubois, D., H. Fargier and H. Prade, The calculus of fuzzy restrictions as a basis for flexible constraint satisfaction, in: IEEE International Conference on Fuzzy Systems, 1993, pp. 1131–1136
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Logic for Multi-domain Authorization Considering Administrators;2008 IEEE Workshop on Policies for Distributed Systems and Networks;2008-06