[1] |
RIBEIRO C , ZUQUETE A , FERREIRA P ,et al. SPL:an access control language for security policies and complex constraints[C]// The Network and Distributed System Security Symposium(NDSS’01). 2001: 89-107.
|
[2] |
DAMIANOU N , DULAY N , LUPU E ,et al. The ponder policy specification language[C]// The International Workshop on Policies for Distributed Systems and Networks. 2001: 18-38.
|
[3] |
OASIS XACML.eXtensible access control Markup language XACML version 3.0[S]. OASIS Standard, 2013.
|
[4] |
RAO P , LIN D , BERTINO E ,et al. An algebra for fine-grained integration of XACML policies[C]// The 14th ACM Symposium on Access Control Models and Technologies (SACMAT’09). 2009: 63-72.
|
[5] |
SHAHZAD M , . Towards composing access control policies[C]// IEEE International Conference on Communications (ICC). 2018: 1-6.
|
[6] |
XU Z , STOLLER S . Mining attribute-based access control policies[J]. IEEE Transactions on Dependable and Secure Computing, 2015,12(5): 533-545.
|
[7] |
NGO C , DEMCHENKO Y , LAAT DE C . Decision diagrams for XACML policy evaluation and management[J]. Computers & Security, 2015,49: 1-16.
|
[8] |
姚键, 茅兵, 谢立 . 一种基于有向图模型的安全策略冲突检测方法[J]. 计算机研究与发展, 2005,42(7): 1108-1114.
|
|
YAO J , MAO B , XIE L . A DAG-based security policy conflicts detection method[J]. Journal of Computer Research and Development, 2005,42(7): 1108-1114.
|
[9] |
李瑞轩, 鲁剑锋, 李添翼 ,等. 一种访问控制策略非一致性冲突消解方法[J]. 计算机学报, 2013,36(6): 1210-1223.
|
|
LI R X , LU J F , LI T Y ,et al. An approach for resolving inconsistency conflicts in access control policies[J]. Chinese Journal of Computers, 2013,36(6): 1210-1223.
|
[10] |
BECKERLE M , MARTUCCI L A . Formal definitions for usable access control rule sets from goals to metrics[C]// The Ninth Symposium on Usable Privacy and Security (SOUPS). 2013: 1-11.
|
[11] |
IYER P , MASOUMZADEH A . Mining positive and negative attribute-based access control policy rules[C]// The 23nd ACM Symposium on Access Control Models and Technologies (SACMAT’18). 2018: 161-172.
|
[12] |
CHAKRABORTY S , SANDHU R , KRISHNAN R . On the feasibility of attribute-based access control policy mining[C]// The 20th IEEE Conference on Information Reuse and Integration (IRI). 2019: 1-8.
|
[13] |
BONATTI P , VIMERCATI S D C , SAMARATI P . An algebra for composing access control policies[J]. ACM Transactions on Information and System Security (TISSEC), 2002,5(1): 1-35.
|
[14] |
LUPU E C , SLOMAN M . Conflicts in policy-based distributed systems management[J]. IEEE Transactions on Software Engineering, 1999,25(6): 852-869.
|
[15] |
ST-MARTIN M , FELTY A P . A verified algorithm for detecting conflicts in XACML access control rules[C]// The 5th ACM SIGPLAN Conference on Certified Programs and Proofs. 2016: 166-175.
|