Security policy refinement using data integration: a position paper
暂无分享,去创建一个
[1] Marek J. Sergot,et al. A logic-based calculus of events , 1989, New Generation Computing.
[2] Joann J. Ordille,et al. Querying Heterogeneous Information Sources Using Source Descriptions , 1996, VLDB.
[3] Clare-Marie Karat,et al. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench , 2006, SOUPS '06.
[4] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[5] Jorge Lobo,et al. Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.
[6] Alon Y. Halevy,et al. Recursive Query Plans for Data Integration , 2000, J. Log. Program..
[7] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[8] Michael R. Genesereth,et al. Query planning in infomaster , 1997, SAC '97.
[9] Marek J. Sergot,et al. A Formal Characterisation of Institutionalised Power , 1996, Log. J. IGPL.