Cited By
View all- Amthor PKühnhauser WPölck AConti MVaidya JSchaad A(2013)Heuristic safety analysis of access control modelsProceedings of the 18th ACM symposium on Access control models and technologies10.1145/2462410.2462413(137-148)Online publication date: 12-Jun-2013
- Ranise SArmando A(2012)On the automated analysis of safety in usage controlProceedings of the 6th international conference on Network and System Security10.1007/978-3-642-34601-9_2(15-28)Online publication date: 21-Nov-2012
- Bruns GHuth MAvijit KBreu RCrampton JLobo J(2011)Program synthesis in administration of higher-order permissionsProceedings of the 16th ACM symposium on Access control models and technologies10.1145/1998441.1998449(41-50)Online publication date: 15-Jun-2011