SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies, Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC '16, pp.35-46, 2016. ,
DOI : 10.1016/j.jcs.2006.10.007
Label-Based Access Control, Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC '16, 2016. ,
DOI : 10.1145/1029133.1029140
URL : http://dl.acm.org/ft_gateway.cfm?id=2875498&type=pdf
Regulating service access and information release on the Web, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.134-143, 2000. ,
DOI : 10.1145/352600.352620
New paradigms for access control in open environments, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005., 2005. ,
DOI : 10.1109/ISSPIT.2005.1577155
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement, Journal of Systems Architecture, vol.57, issue.4, pp.412-424, 2011. ,
DOI : 10.1016/j.sysarc.2010.04.005
Guide to attribute based access control (ABAC) definition and considerations, NIST Special Publication, vol.800, p.162, 2014. ,
DOI : 10.6028/NIST.SP.800-162
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC, pp.41-55, 2012. ,
DOI : 10.1145/501983.502004
URL : https://hal.archives-ouvertes.fr/hal-01534757
A Flexible Attribute Based Access Control Method for Grid Computing, Journal of Grid Computing, vol.19, issue.2, pp.169-180, 2009. ,
DOI : 10.3233/JCS-2002-10303
Extensible access control markup language (XACML) version 2.0. Oasis Standard, 2005. ,
The UCON ABC usage control model, TISSEC, 2004. ,
Supporting attribute-based access control with ontologies, First International Conference on Availability, Reliability and Security (ARES'06), p.8, 2006. ,
DOI : 10.1109/ARES.2006.127
Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993. ,
DOI : 10.1109/2.241422
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994. ,
DOI : 10.1109/35.312842
HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control, FPS, pp.187-204, 2014. ,
DOI : 10.1007/978-3-319-17040-4_12
An Attribute-Based Access Control Model for Web Services, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp.74-79, 2006. ,
DOI : 10.1109/PDCAT.2006.28
A theory for comparing the expressive power of access control models1, Journal of Computer Security, vol.15, issue.2, pp.231-272, 2007. ,
DOI : 10.3233/JCS-2007-15202
A logic-based framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.45-55, 2004. ,
DOI : 10.1145/1029133.1029140
URL : http://users.encs.concordia.ca/~wang/papers/fmse04.pdf
Attributed based access control (ABAC) for Web services, IEEE International Conference on Web Services (ICWS'05), 2005. ,
DOI : 10.1109/ICWS.2005.25