Cited By
View all- Jabal ADavari MBertino EMakaya CCalo SVerma DRusso AWilliams C(2019)Methods and Tools for Policy AnalysisACM Computing Surveys10.1145/329574951:6(1-35)Online publication date: 4-Feb-2019
- Shaikh RAdi KLogrippo L(2017)A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy SetsInternational Journal of Information Security10.1007/s10207-016-0317-116:1(91-113)Online publication date: 1-Feb-2017
- Taha AMetzler PTrapero RLuna JSuri NChen XWang XHuang X(2016)Identifying and Utilizing Dependencies Across Cloud Security ServicesProceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897911(329-340)Online publication date: 30-May-2016
- Show More Cited By