TY - STD TI - Bahrak, B, Deshpande A, Whitaker M, Park J (2010) BRESAP: A Policy Reasoner for Processing Spectrum Access Policies Represented by Binary Decision Diagrams In: Proceedings of Symposium on New Frontiers in Dynamic Spectrum, 1–12.. IEEE. ID - ref1 ER - TY - JOUR AU - Banzhaf, J. F. PY - 1966 DA - 1966// TI - Multi-Member Electoral Districts. Do They Violate the “One Man, One Vote” Principle JO - Yale Law J VL - 75 UR - https://doi.org/10.2307/795047 DO - 10.2307/795047 ID - Banzhaf1966 ER - TY - CHAP AU - Barrett, C. AU - Conway, C. L. AU - Deters, M. AU - Hadarean, L. AU - Jovanović, D. AU - King, T. AU - Reynolds, A. AU - Tinelli, C. PY - 2011 DA - 2011// TI - CVC4 BT - Proceedings of International Conference on Computer Aided Verification, LNCS, vol 6806 PB - Springer CY - Berlin ID - Barrett2011 ER - TY - JOUR AU - Bryant, R. E. PY - 1992 DA - 1992// TI - Symbolic Boolean Manipulation with Ordered Binary-Decision Diagrams JO - ACM Comput Surv VL - 24 UR - https://doi.org/10.1145/136035.136043 DO - 10.1145/136035.136043 ID - Bryant1992 ER - TY - CHAP AU - Crampton, J. AU - Huth, M. PY - 2010 DA - 2010// TI - An authorization framework resilient to policy evaluation failures, LNCS, vol 6345 BT - Computer Security PB - Springer CY - Berlin ID - Crampton2010 ER - TY - CHAP AU - Crampton, J. AU - Morisset, C. PY - 2012 DA - 2012// TI - PTaCL: A Language for Attribute-Based Access Control in Open Systems, LNCS, vol 7215 BT - Principles of Security and Trust PB - Springer CY - Berlin UR - https://doi.org/10.1007/978-3-642-28641-4_21 DO - 10.1007/978-3-642-28641-4_21 ID - Crampton2012 ER - TY - CHAP AU - Crampton, J. AU - Morisset, C. AU - Zannone, N. PY - 2015 DA - 2015// TI - On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval BT - Proceedings of Symposium on Access Control Models and Technologies PB - ACM CY - New York UR - https://doi.org/10.1145/2752952.2752970 DO - 10.1145/2752952.2752970 ID - Crampton2015 ER - TY - CHAP AU - Crampton, J. AU - Williams, C. PY - 2016 DA - 2016// TI - On completeness in languages for attribute-based access control BT - Proceedings of Symposium on Access Control Models and Technologies PB - ACM CY - New York ID - Crampton2016 ER - TY - STD TI - Dolski, S, Huonder F, Oberholzer S (2007) HERAS-AF: XACML 2.0 Implementation. Tech. rep., University of Applied Sciences Rapperswil. ID - ref9 ER - TY - CHAP AU - Fisler, K. AU - Krishnamurthi, S. AU - Meyerovich, L. AU - Tschantz, M. PY - 2005 DA - 2005// TI - Verification and change-impact analysis of access-control policies BT - Proceedings of International Conference on Software Engineering PB - ACM CY - New York ID - Fisler2005 ER - TY - JOUR AU - Hu, H. AU - Ahn, G. AU - Kulkarni, K. PY - 2013 DA - 2013// TI - Discovery and Resolution of Anomalies in Web Access Control Policies JO - IEEE Trans Dependable Secure Comput VL - 10 UR - https://doi.org/10.1109/TDSC.2013.18 DO - 10.1109/TDSC.2013.18 ID - Hu2013 ER - TY - STD TI - Kaluvuri, SP, Egner AI, den Hartog J, Zannone N (2015) SAFAX - an extensible authorization service for cloud environments. Front ICT 2. ID - ref12 ER - TY - JOUR AU - Liu, A. AU - Chen, F. AU - Hwang, J. AU - Xie, T. PY - 2011 DA - 2011// TI - Designing fast and scalable XACML policy evaluation engines JO - IEEE Trans Comput VL - 60 UR - https://doi.org/10.1109/TC.2010.274 DO - 10.1109/TC.2010.274 ID - Liu2011 ER - TY - CHAP AU - Morisset, C. AU - Willemse, T. A. C. AU - Zannone, N. PY - 2018 DA - 2018// TI - Efficient extended ABAC evaluation BT - Proceedings of Symposium on Access Control Models and Technologies PB - ACM CY - New York UR - https://doi.org/10.1145/3205977.3205980 DO - 10.1145/3205977.3205980 ID - Morisset2018 ER - TY - CHAP AU - Morisset, C. AU - Zannone, N. PY - 2014 DA - 2014// TI - Reduction of access control decisions BT - Proceedings of Symposium on Access Control Models and Technologies PB - ACM CY - New York ID - Morisset2014 ER - TY - STD TI - OASIS (2005) eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard. ID - ref16 ER - TY - STD TI - OASIS (2013) eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard. ID - ref17 ER - TY - CHAP AU - Rudell, R. PY - 1993 DA - 1993// TI - Dynamic variable ordering for ordered binary decision diagrams BT - Proceedings of International Conference on Computer Aided Design PB - IEEE CY - Los Alamitos ID - Rudell1993 ER - TY - STD TI - Srinivasan, A, Ham T, Malik S, Brayton RK (1990) Algorithms for discrete function manipulation In: Proceedings of International Conference on Computer-Aided Design, 92–95.. IEEE. ID - ref19 ER - TY - CHAP AU - Tschantz, M. AU - Krishnamurthi, S. PY - 2006 DA - 2006// TI - Towards reasonability properties for access-control policy languages BT - Proceedings of Symposium on Access Control Models and Technologies PB - ACM CY - New York ID - Tschantz2006 ER - TY - JOUR AU - Turkmen, F. AU - den Hartog, J. AU - Ranise, S. AU - Zannone, N. PY - 2017 DA - 2017// TI - Formal analysis of XACML policies using SMT JO - Comput Secur VL - 66 UR - https://doi.org/10.1016/j.cose.2017.01.009 DO - 10.1016/j.cose.2017.01.009 ID - Turkmen2017 ER - TY - CHAP AU - Zhang, N. AU - Ryan, M. AU - Guelev, D. PY - 2005 DA - 2005// TI - Evaluating access control policies through model checking, LNCS, vol 3650 BT - Information Security PB - Springer CY - Berlin UR - https://doi.org/10.1007/11556992_32 DO - 10.1007/11556992_32 ID - Zhang2005 ER -