Fuzzy MLS : An Experiment on Quantified Risk – Adaptive Access Control
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Roger R. Schell,et al. Designing the GEMSOS security kernel for security and performance , 1985 .
[3] Daniel F. Sterne,et al. Confining Root Programs with Domain and Type Enforcement , 1996, USENIX Security Symposium.
[4] Chuen-Tsai Sun,et al. Neuro-fuzzy And Soft Computing: A Computational Approach To Learning And Machine Intelligence [Books in Brief] , 1997, IEEE Transactions on Neural Networks.
[5] Axel Schairer,et al. Verification of a Formal Security Model for Multiapplicative Smart Cards , 2000, ESORICS.
[6] Pau-Chen Cheng,et al. BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.
[7] Etienne J. Khayat,et al. Risk Based Security Analysis of Permissions in RBAC , 2004, WOSIS.
[8] Anton Riabov,et al. Planning for Stream Processing Systems , 2005, AAAI.
[9] David Ingram,et al. Risk Models for Trust-Based Access Control(TBAC) , 2005, iTrust.
[10] Anton Riabov,et al. Scalable Planning for Distributed Stream Processing Systems , 2006, ICAPS.