Cited By
View all- Ruiz JNarendran PMasoumzadeh AIyer PNiu JVaidya J(2024)Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny RulesProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657040(159-169)Online publication date: 24-Jun-2024
- Farhadighalati NBarata JNikghadam-Hojjati SMarchetti E(2024)Behavioral and Human-Centric Access Control Model in XACML Reference Architecture: Design and Implementation of EHR Case StudyTechnological Innovation for Human-Centric Systems10.1007/978-3-031-63851-0_13(192-203)Online publication date: 28-Jun-2024
- Iyer PMasoumzadeh ARanise SCarbone RTakabi D(2023)Towards Automated Learning of Access Control Policies Enforced by Web ApplicationsProceedings of the 28th ACM Symposium on Access Control Models and Technologies10.1145/3589608.3594743(163-168)Online publication date: 24-May-2023
- Show More Cited By