Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Caracciolo di Forino, Alfonso
1964.
N-Ary selection functions and formal selective systems. Part I.
Calcolo,
Vol. 1,
Issue. 1,
p.
49.
Ivas'kiv, Yu. L.
Pospelov, D. A.
and
Toshich, Zh.
1972.
Representations in many-valued logics.
Cybernetics,
Vol. 5,
Issue. 2,
p.
163.
rosenberg, ivo g.
1977.
Computer Science and Multiple-Valued Logic.
p.
144.
Gaines, B.R.
and
Kohout, L.J.
1977.
The fuzzy decade: a bibliography of fuzzy systems and closely related topics.
International Journal of Man-Machine Studies,
Vol. 9,
Issue. 1,
p.
1.
Ni, Qun
Bertino, Elisa
and
Lobo, Jorge
2009.
D-algebra for composing access control policy decisions.
p.
298.
Crampton, Jason
and
Morisset, Charles
2012.
Principles of Security and Trust.
Vol. 7215,
Issue. ,
p.
390.
Griesmayer, Andreas
and
Morisset, Charles
2013.
Computer Security – ESORICS 2013.
Vol. 8134,
Issue. ,
p.
574.
Ciucci, D.
and
Dubois, D.
2013.
A map of dependencies among three-valued logics.
Information Sciences,
Vol. 250,
Issue. ,
p.
162.
Morisset, Charles
and
Zannone, Nicola
2014.
Reduction of access control decisions.
p.
53.
Crampton, Jason
and
Williams, Conrad
2016.
On Completeness in Languages for Attribute-Based Access Control.
p.
149.
Crampton, Jason
and
Williams, Conrad
2017.
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control.
p.
47.
Crampton, Jason
and
Williams, Conrad
2017.
Attribute Expressions, Policy Tables and Attribute-Based Access Control.
p.
79.
Sheikhalishahi, Mina
Tillem, Gamze
Erkin, Zekeriya
and
Zannone, Nicola
2019.
Privacy-Preserving Multi-Party Access Control.
p.
1.
Sheikhalishahi, Mina
Stork, Ischa
and
Zannone, Nicola
2022.
Privacy-preserving policy evaluation in multi-party access control.
Journal of Computer Security,
Vol. 29,
Issue. 6,
p.
613.