ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Extensible Intra Access Control Policy Conflict Detection Algorithm
2009 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2009.248
◽
2009
◽
Cited By ~ 1
Author(s):
Bei Wu
◽
Xing-yuan Chen
◽
Yong-fui Zhang
◽
Xiang-dong Dai
Keyword(s):
Access Control
◽
Control Policy
◽
Detection Algorithm
◽
Conflict Detection
◽
Access Control Policy
◽
Policy Conflict
Download Full-text
Related Documents
Cited By
References
A DL-based method for access control policy conflict detecting
Proceedings of the First Asia-Pacific Symposium on Internetware - Internetware '09
◽
10.1145/1640206.1640222
◽
2009
◽
Cited By ~ 10
Author(s):
Feng Huang
◽
Zhiqiu Huang
◽
Linyuan Liu
Keyword(s):
Access Control
◽
Control Policy
◽
Access Control Policy
◽
Policy Conflict
Download Full-text
Toward resolving access control policy conflict in inter-organizational workflows
2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)
◽
10.1109/aiccsa.2015.7507218
◽
2015
◽
Cited By ~ 1
Author(s):
Asmaa Elkandoussi
◽
Hanan Elbakkali
◽
Narimane Elhilali
Keyword(s):
Access Control
◽
Control Policy
◽
Access Control Policy
◽
Policy Conflict
Download Full-text
Conflict Detection Model of Access Control Policy in Collaborative Environment
2011 International Conference on Computational and Information Sciences
◽
10.1109/iccis.2011.112
◽
2011
◽
Cited By ~ 6
Author(s):
Beibei Fan
◽
Xiaoyan Liang
◽
Yang Luo
◽
Yang Bo
◽
Chunhe Xia
Keyword(s):
Access Control
◽
Control Policy
◽
Conflict Detection
◽
Access Control Policy
◽
Detection Model
◽
Collaborative Environment
Download Full-text
Conflict Detection and Resolution in Access Control Policy Specifications
Lecture Notes in Computer Science - Foundations of Software Science and Computation Structures
◽
10.1007/3-540-45931-6_16
◽
2002
◽
pp. 223-238
◽
Cited By ~ 15
Author(s):
Manuel Koch
◽
Luigi V. Mancini
◽
Francesco Parisi-Presicce
Keyword(s):
Access Control
◽
Control Policy
◽
Conflict Detection
◽
Access Control Policy
◽
Conflict Detection And Resolution
Download Full-text
Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
New Generation Computing
◽
10.1007/s00354-021-00130-6
◽
2021
◽
Author(s):
Sudakshina Mandal
◽
Danish Ali Khan
◽
Sarika Jain
Keyword(s):
Access Control
◽
Control Policy
◽
Access Control Policy
◽
Work From Home
◽
Support Work
Download Full-text
Access Control Policy Enforcement for Zero-Trust-Networking
2018 29th Irish Signals and Systems Conference (ISSC)
◽
10.1109/issc.2018.8585365
◽
2018
◽
Cited By ~ 3
Author(s):
Romans Vanickis
◽
Paul Jacob
◽
Sohelia Dehghanzadeh
◽
Brian Lee
Keyword(s):
Access Control
◽
Control Policy
◽
Policy Enforcement
◽
Access Control Policy
Download Full-text
Visualization Analysis of Multi-Domain Access Control Policy Integration Based on Tree-Maps and Semantic Substrates
Intelligent Information Management
◽
10.4236/iim.2012.46028
◽
2012
◽
Vol 04
(06)
◽
pp. 188-193
Author(s):
Li Pan
Keyword(s):
Access Control
◽
Control Policy
◽
Policy Integration
◽
Access Control Policy
◽
Visualization Analysis
Download Full-text
Inferring Access-Control Policy Properties via Machine Learning
Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)
◽
10.1109/policy.2006.19
◽
2006
◽
Cited By ~ 6
Author(s):
E. Martin
◽
Tao Xie
Keyword(s):
Machine Learning
◽
Access Control
◽
Control Policy
◽
Access Control Policy
Download Full-text
Access Control Policy Languages
Encyclopedia of Database Systems
◽
10.1007/978-1-4899-7993-3_5-2
◽
2014
◽
pp. 1-6
Author(s):
Athena Vakali
Keyword(s):
Access Control
◽
Control Policy
◽
Access Control Policy
◽
Policy Languages
Download Full-text
A Formal Model and Correctness Proof for an Access Control Policy Framework
Certified Programs and Proofs - Lecture Notes in Computer Science
◽
10.1007/978-3-319-03545-1_19
◽
2013
◽
pp. 292-307
Author(s):
Chunhan Wu
◽
Xingyuan Zhang
◽
Christian Urban
Keyword(s):
Access Control
◽
Formal Model
◽
Control Policy
◽
Policy Framework
◽
Access Control Policy
◽
Correctness Proof
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close