Cited By
View all- Nguyen DAutrel FBouabdallah ADoyen G(2023)A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security PoliciesNOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS56928.2023.10154304(1-7)Online publication date: 8-May-2023
- Wang HCao JZhang YWang HCao JZhang Y(2020)Using RBAC to Secure Payment Process in CloudAccess Control Management in Cloud Environments10.1007/978-3-030-31729-4_6(117-138)Online publication date: 30-Sep-2020
- Berger BMaeder CWete Nguempnang RSohr KRubio-Medrano CKerschbaum FMashatan ANiu JLee A(2019)Towards Effective Verification of Multi-Model Access Control PropertiesProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325105(149-160)Online publication date: 28-May-2019
- Show More Cited By