[1] |
Brief Introduction to XACML[EB/OL]. .
|
[2] |
Sun XACML[EB/OL]. .
|
[3] |
XACMLight[EB/OL]. .
|
[4] |
AXESCON XACML[EB/OL]. .
|
[5] |
Enterprise XACML[EB/OL]. .
|
[6] |
BUTLER B , JENNINGS B , FAME D B . XACML policy perfor mance evaluation using a flexible load testing framework[A]. Proceedings of the 17th ACM conference on Computer and communications security (CCS)[C]. New York, USA, 2010, 978-980.
|
[7] |
LIU A X , CHEN F , HWANG J H . esigning fast and scalable XACML policy evaluation engines[J]. IEEE Transactions on Com-puters, 2011, 60(12): 1802-1817.
|
[8] |
LIU A X , CHEN F , HWANG J H . XEngine: a fast and scalable XACML policy evaluation engine[A]. Proceedings of the 2008 ACM-SIGMETRICS International Conference on Measurement and Model-ing of Computer Systems[C]. New York, USA, 2008, 265-276.
|
[9] |
MAROUF S , SHEHAB M , SQUICCIARINI A . Adaptive reordering and clustering-based framework for efficient XACML policy evalua-tion[J]. IEEE Transactions on Services Computing, 2011, 10(4): 300-313.
|
[10] |
王雅皙, 冯登国, 张立武 . 基于多层次优化技术的XACML策略评估引擎[J]. 软件学报, 2011,22(2):323-338. WANG Y Z , FENG D G , ZHANG L W . XACML policy evaluation engine based on multi-level optimization technology[J]. JJournal of Software, 2011,22(2):323-338.
|
[11] |
王雅皙, 冯登国 . 一种XACML规则冲突及冗余分析方法[J]. 计算机学报, 2009,32(3):516-530. WANG Y Z , FENG D G . A conflict and redundancy analysis method for XACML rules[J]. Chinese Journal of Computers, 2009,32(3):516-530.
|
[12] |
STEPIEN B , MATWIN S , FELTY A . An algorithm for compression of XACML access control policy sets by recursive subsumption[A]. 2012 Seventh International Conference on Availability, Reliability and Se-curity[C]. Ottawa, Canada, 2012, 161-167.
|
[13] |
PHILIP L , MISELDINE S A , KARLSRUHE . Automated xacml policy reconfiguration for evaluation optimization[A]. Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems[C] New York, USA, 2008. 1-8.
|
[14] |
TURKMEN F , CRISPO B . Performance evaluation of XACML PDP implementations[A]. Proceedings of the 2008 ACM Workshop on Se-cure web services[C] New York, USA, 2008. 37-44.
|
[15] |
XACML 2.0 conformance tests[EB/OL]. .
|
[16] |
FISLER K , KRISHNAMURTHI S , MEYEROVICH L . Verification and change impact analysis of access-control policies[A]. Proceedings of the 27th International Conference on Software Engineering[C] New York, USA, 2005. 196-205.
|