Five examples of web-services for illustrating requirements for security architecture
暂无分享,去创建一个
Alan W. Colman | Ron Addie | Stijn Dekeyser | Sam Moffatt | R. Addie | A. Colman | Sam Moffatt | Stijn Dekeyser
[1] Mark Ryan,et al. Evaluating Access Control Policies Through Model Checking , 2005, ISC.
[2] Hans Hermes,et al. Introduction to mathematical logic , 1973, Universitext.
[3] Anna van Raaphorst. OASIS (Organization for the Advancement of Structured Information Standards) , 2006 .
[4] Pierre-Yves Schobbens,et al. Model-Checking Access Control Policies , 2004, ISC.
[5] Peter Aczel etc. HANDBOOK OF MATHEMATICAL LOGIC , 1999 .
[6] Sam Moffatt,et al. Access control in semantic information systems , 2010 .
[7] Mark Ryan,et al. Synthesising verified access control systems in XACML , 2004, FMSE '04.
[8] Martín Abadi,et al. A Calculus for Access Control in Distributed Systems , 1991, CRYPTO.
[9] Mark Ryan,et al. Synthesising verified access control systems through model checking , 2008, J. Comput. Secur..