Cited By
View all- Hale MGamble R(2019)Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standardsRequirements Engineering10.1007/s00766-017-0287-524:3(365-402)Online publication date: 1-Sep-2019
- Sabri KHiary H(2016)Algebraic Model for Handling Access Control PoliciesProcedia Computer Science10.1016/j.procs.2016.04.14683(653-657)Online publication date: 2016
- Nassr NSteegmans EMakarevich OPoet RElçi AGaur MOrgun MBabenko LFerdous SHo ALaxmi VPieprzyk J(2015)Mitigating conflicts of interest by authorization policiesProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2800013(118-126)Online publication date: 8-Sep-2015
- Show More Cited By