1. Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24
2. Mining Domain-Based Policies;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
3. Trusted Data Access Control Based on Logistics Business Collaboration Semantics;Applied Sciences;2024-05-12
4. UCAT: The Uniform Categorization for Access Control;Lecture Notes in Computer Science;2024
5. A Review of Social Network Regulations and Mechanisms for Safeguarding Children’s Privacy;Lecture Notes on Data Engineering and Communications Technologies;2024