Establishment of attribute bitmaps for efficient XACML policy evaluation
暂无分享,去创建一个
[1] Yves Le Traon,et al. Transforming and Selecting Functional Test Cases for Security Policy Testing , 2009, 2009 International Conference on Software Testing Verification and Validation.
[2] Cees T. A. M. de Laat,et al. Decision Diagrams for XACML Policy Evaluation and Management , 2015, Comput. Secur..
[3] Jorge Lobo,et al. Privacy-aware role-based access control , 2010 .
[4] Tao Xie,et al. Designing Fast and Scalable XACML Policy Evaluation Engines , 2011, IEEE Transactions on Computers.
[5] Anna Cinzia Squicciarini,et al. Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation , 2011, IEEE Transactions on Services Computing.
[6] Wang Ya,et al. XACML Policy Evaluation Engine Based on Multi-Level Optimization Technology , 2011 .
[7] Tao Xie,et al. Xengine: a fast and scalable XACML policy evaluation engine , 2008, SIGMETRICS '08.
[8] Evan Martin,et al. Automated test generation for access control policies , 2006, OOPSLA '06.
[9] Azzam Mourad,et al. SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services , 2015, Expert Syst. Appl..
[10] Félix Gómez Mármol,et al. Graph-based XACML evaluation , 2012, SACMAT '12.
[11] Xu Wei-min. Study of XACML Policy Based on Description Logic , 2013 .
[12] Flemming Nielson,et al. The Logic of XACML , 2011, FACS.
[13] Francesco Tiezzi,et al. Formalisation and Implementation of the XACML Access Control Mechanism , 2012, ESSoS.
[14] Yves Le Traon,et al. A Model-Based Framework for Security Policy Specification, Deployment and Testing , 2008, MoDELS.
[15] Charles V. Wright,et al. Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.
[16] Ramzi A. Haraty,et al. Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies , 2015, Comput. Electr. Eng..
[17] Yves Le Traon,et al. Test-Driven Assessment of Access Control in Legacy Applications , 2008, 2008 1st International Conference on Software Testing, Verification, and Validation.
[18] Yuri Demchenko,et al. On the Use of SMT Solving for XACML Policy Evaluation , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
[19] Azzam Mourad,et al. New XACML-AspectBPEL approach for composite web services security , 2013, Int. J. Web Grid Serv..
[20] Tong Liu,et al. Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data , 2015, IWSEC.
[21] Yves Le Traon,et al. Refactoring access control policies for performance improvement , 2012, ICPE '12.
[22] Bhavani M. Thuraisingham,et al. Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems , 2011, IEEE Transactions on Services Computing.