Interactions among secrecy models - (Work-in-progress paper)
暂无分享,去创建一个
[1] Frédéric Cuppens,et al. Analyzing consistency of security policies , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[2] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[3] Luigi Logrippo,et al. Governance Policies for Privacy Access Control and their Interactions , 2005, FIW.
[4] Evan H. Magill,et al. Feature Interactions in Telecommunications and Software Systems VI, May 17-19, 2000, Glasgow, Scotland, UK , 2000, FIW.