Interactive simulation of security policies
Proceedings of the 2002 ACM symposium on Applied computing
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
A Policy Language for the Management of Distributed Agents
AOSE '01 Revised Papers and Invited Contributions from the Second International Workshop on Agent-Oriented Software Engineering II
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
Applying Semantic Knowledge to Real-Time Update of Access Control Policies
IEEE Transactions on Knowledge and Data Engineering
Combining logics for modelling security policies
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Systematic control and management of data integrity
Proceedings of the eleventh ACM symposium on Access control models and technologies
A lattice-based approach for updating access control policies in real-time
Information Systems
A generic policy-conflict handling model
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Distributed processing of context-aware authorization in ubiquitous computing environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Hi-index | 0.00 |