SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy
暂无分享,去创建一个
Nghi Huynh | Marc Frappier | Amel Mammar | Régine Laleau | Herman Pooda | Régine Laleau | M. Frappier | N. Huynh | A. Mammar | Herman Pooda
[1] Jerry den Hartog,et al. Formal analysis of XACML policies using SMT , 2017, Comput. Secur..
[2] Nghi Huynh,et al. Validating the RBAC ANSI 2012 Standard Using B , 2014, ABZ.
[3] Martyn Thomas,et al. Industrial Deployment of System Engineering Methods , 2013, Springer Berlin Heidelberg.
[4] Michael Leuschel,et al. Under consideration for publication in Formal Aspects of Computing Automated Property Verification for Large Scale B Models with ProB , 2010 .
[5] Régine Laleau,et al. Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments , 2011, Int. J. Syst. Serv. Oriented Eng..
[6] Andrew C. Simpson,et al. On Formalizing and Normalizing Role-Based Access Control Systems , 2009, Comput. J..
[7] John S. Fitzgerald,et al. Formal Engineering of XACML Access Control Policies in VDM++ , 2007, ICFEM.
[8] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[9] Michael Leuschel,et al. Improving Railway Data Validation with ProB , 2013, Industrial Deployment of System Engineering Methods.
[10] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[11] Daniel Jackson,et al. Software Abstractions - Logic, Language, and Analysis , 2006 .
[12] Mao Bi,et al. Role based Access Control Model , 2003 .
[13] Jean-Raymond Abrial,et al. The B-book - assigning programs to meanings , 1996 .