Cited By
View all- Suntaxi GEl Ghazi ABöhm KKerschbaum FMashatan ANiu JLee A(2019)Mutual AuthorizationsProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325415(213-218)Online publication date: 28-May-2019
- Ben Fadhel ABianculli DBriand LHuchard MKästner CFraser G(2018)Model-driven run-time enforcement of complex role-based access control policiesProceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering10.1145/3238147.3238167(248-258)Online publication date: 3-Sep-2018
- de Leon DBrown MJillepalli AStalick AAlves-Foss J(2017)High-level and formal router policy verificationJournal of Computing Sciences in Colleges10.5555/3144605.314463133:1(118-128)Online publication date: 1-Oct-2017
- Show More Cited By