Cited By
View all- Jayasundara SGamagedara Arachchilage NRussello G(2024)SoK: Access Control Policy Generation from High-level Natural Language RequirementsACM Computing Surveys10.1145/370605757:4(1-37)Online publication date: 28-Nov-2024
- Andalibi VLear EKim DCamp L(2022)On the Analysis of MUD-Files’ Interactions, Conflicts, and Configuration Requirements Before DeploymentThe Fifth International Conference on Safety and Security with IoT10.1007/978-3-030-94285-4_9(137-157)Online publication date: 8-Jan-2022
- Narouei M(2020)A Top-Down Policy Engineering Framework for Attribute-Based Access Controlundefined10.12794/metadc1703379Online publication date: May-2020
- Show More Cited By