Cited By
View all- Parkinson SKhana S(2022)Identifying high-risk over-entitlement in access control policies using fuzzy logicCybersecurity10.1186/s42400-022-00112-15:1Online publication date: 2-Mar-2022
- Chee YChrisnata JKiah HNguyen T(2019)Deciding the Confusability of Words under Tandem Repeats in Linear TimeACM Transactions on Algorithms10.1145/333851415:3(1-22)Online publication date: 16-Jul-2019
- Mitropoulos DSotiropoulos TKoutsovasilis NSpinellis D(2019)PDGuard: an architecture for the control and secure processing of personal dataInternational Journal of Information Security10.1007/s10207-019-00468-5Online publication date: 24-Sep-2019
- Show More Cited By