Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems. | 0 | 0.34 | 2020 |
Pseudo-Exhaustive Verification of Rule Based Systems. | 0 | 0.34 | 2018 |
Access Control for Emerging Distributed Systems. | 2 | 0.39 | 2018 |
Verification of Resilience Policies that Assist Attribute Based Access Control. | 0 | 0.34 | 2017 |
Access Control for Distributed Processing Systems: Use Cases and General Considerations | 0 | 0.34 | 2017 |
Access Control Policy Verification. | 0 | 0.34 | 2016 |
General Methods for Access Control Policy Verification (Application Paper). | 0 | 0.34 | 2016 |
Pseudo-Exhaustive Testing of Attribute Based Access Control Rules | 3 | 0.44 | 2016 |
Differentiating Non-Isomorphic Graphlets for Graph Analytics | 0 | 0.34 | 2016 |
Attribute-Based Access Control | 30 | 1.08 | 2015 |
Implementing and Managing Policy Rules in Attribute Based Access Control | 3 | 0.49 | 2015 |
Security policy verification for multi-domains in cloud systems | 11 | 0.64 | 2014 |
An Access Control scheme for Big Data processing | 7 | 0.55 | 2014 |
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems | 1 | 0.35 | 2013 |
Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit | 0 | 0.34 | 2013 |
Model Checking For Verification Of Mandatory Access Control Models And Properties | 16 | 1.11 | 2011 |
Specification of attribute relations for access control policies and constraints using Policy Machine | 0 | 0.34 | 2010 |
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies | 5 | 0.43 | 2009 |
Property Verification for Generic Access Control Models | 15 | 0.79 | 2008 |
Access Control Policy Combinations for the Grid Using the Policy Machine | 6 | 0.65 | 2007 |
Conformance Checking of Access Control Policies Specified in XACML | 30 | 1.26 | 2007 |
A trust domain management schema for multiple grid environments | 0 | 0.34 | 2007 |
The Computational Complexity of Enforceability Validation for Generic Access Control Rules | 5 | 0.46 | 2006 |
The Policy Machine for Security Policy Management | 9 | 0.82 | 2001 |