Author:
Bauer Lujo,Garriss Scott,Reiter Michael K.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Continuous Access Control Validation and Forensics;Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security;2019-11-06
2. On Building a Visualisation Tool for Access Control Policies;Communications in Computer and Information Science;2019
3. How Do System Administrators Resolve Access-Denied Issues in the Real World?;Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems;2017-05-02
4. Role updating in information systems using model checking;Knowledge and Information Systems;2016-07-30
5. A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets;International Journal of Information Security;2016-01-30