Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures
Future Generation Computer Systems2020Vol. 113, pp. 113–131
Citations Over Time
Related Papers
- → Role-based Access Control(2010)17 cited
- → Research on Policy-based Access Control Model(2009)11 cited
- → Trust Based Authorization and Access Control(2009)2 cited
- → Authorization and access control in IRO-DB(2002)22 cited
- → Supporting Negative Authorization in Spatiotemporal Role Based Access Control(2009)